{"api_version":"1","generated_at":"2026-04-24T22:07:52+00:00","cve":"CVE-2008-1676","urls":{"html":"https://cve.report/CVE-2008-1676","api":"https://cve.report/api/cve/CVE-2008-1676.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-1676","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-1676"},"summary":{"title":"CVE-2008-1676","description":"Red Hat PKI Common Framework (rhpki-common) in Red Hat Certificate System (aka Certificate Server or RHCS) 7.1 through 7.3, and Netscape Certificate Management System 6.x, does not recognize Certificate Authority profile constraints on Extensions, which might allow remote attackers to bypass intended restrictions and conduct man-in-the-middle attacks by submitting a certificate signing request (CSR) and using the resulting certificate.","state":"PUBLISHED","assigner":"redhat","published_at":"2008-07-07 23:41:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-255","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43573","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43573","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/30929","name":"http://secunia.com/advisories/30929","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat update for rhpki-common - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/30062","name":"http://www.securityfocus.com/bid/30062","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Certificate System rhpki-common Security Bypass Weakness","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://rhn.redhat.com/errata/RHSA-2008-0500.html","name":"http://rhn.redhat.com/errata/RHSA-2008-0500.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2008-0577.html","name":"http://rhn.redhat.com/errata/RHSA-2008-0577.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445227","name":"https://bugzilla.redhat.com/show_bug.cgi?id=445227","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Bug 445227 – CVE-2008-1676 Certificate System: incorrect handling of Extensions in CSRs (cs71)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1020427","name":"http://www.securitytracker.com/id?1020427","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat Certificate System CSR Extension Handling Bug May Let Users Bypass Security Policy - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2008:0500","name":"MISC:https://access.redhat.com/errata/RHSA-2008:0500","refsource":"MITRE","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://access.redhat.com/errata/RHSA-2008:0577","name":"MISC:https://access.redhat.com/errata/RHSA-2008:0577","refsource":"MITRE","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://access.redhat.com/security/cve/CVE-2008-1676","name":"MISC:https://access.redhat.com/security/cve/CVE-2008-1676","refsource":"MITRE","tags":[],"title":"CVE-2008-1676 - Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-1676","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1676","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"1676","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"certificate_management_system","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1676","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"certificate_management_system","cpe6":"6.01","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1676","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"certificate_management_system","cpe6":"6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1676","vulnerable":"1","versionEndIncluding":"6.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netscape","cpe5":"certificate_management_system","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1676","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"certificate_system","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1676","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"certificate_system","cpe6":"7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1676","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"certificate_system","cpe6":"7.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T08:32:01.466Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"30062","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/30062"},{"name":"rhcs-rhpkicommon-csr-security-bypass(43573)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43573"},{"name":"RHSA-2008:0500","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0500.html"},{"name":"1020427","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1020427"},{"name":"RHSA-2008:0577","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0577.html"},{"name":"30929","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/30929"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445227"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-07-02T00:00:00.000Z","descriptions":[{"lang":"en","value":"Red Hat PKI Common Framework (rhpki-common) in Red Hat Certificate System (aka Certificate Server or RHCS) 7.1 through 7.3, and Netscape Certificate Management System 6.x, does not recognize Certificate Authority profile constraints on Extensions, which might allow remote attackers to bypass intended restrictions and conduct man-in-the-middle attacks by submitting a certificate signing request (CSR) and using the resulting certificate."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-07T12:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"30062","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/30062"},{"name":"rhcs-rhpkicommon-csr-security-bypass(43573)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/43573"},{"name":"RHSA-2008:0500","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0500.html"},{"name":"1020427","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1020427"},{"name":"RHSA-2008:0577","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2008-0577.html"},{"name":"30929","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/30929"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445227"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2008-1676","datePublished":"2008-07-07T23:00:00.000Z","dateReserved":"2008-04-03T00:00:00.000Z","dateUpdated":"2024-08-07T08:32:01.466Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-07-07 23:41:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-255","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:redhat:certificate_system:7.1:*:*:*:*:*:*:*","matchCriteriaId":"A94B7103-11B7-4B1E-AE02-86210F9CCCAA"},{"vulnerable":false,"criteria":"cpe:2.3:a:redhat:certificate_system:7.2:*:*:*:*:*:*:*","matchCriteriaId":"27FE079E-FB15-443C-BE2E-1D4C940BB8C0"},{"vulnerable":false,"criteria":"cpe:2.3:a:redhat:certificate_system:7.3:*:*:*:*:*:*:*","matchCriteriaId":"E2654E6A-190C-4D5C-ABC0-89011DD8E293"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:certificate_management_system:*:*:*:*:*:*:*:*","versionEndIncluding":"6.2","matchCriteriaId":"946E7D94-5FD5-40C2-B67A-14C0D13CDDAB"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:certificate_management_system:6.0:*:*:*:*:*:*:*","matchCriteriaId":"8D852DF7-F08A-4EAC-B7BB-D3384CA0B9B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:certificate_management_system:6.01:*:*:*:*:*:*:*","matchCriteriaId":"5DD96E83-2151-4AFE-B3B3-E9CCF69D4B77"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:certificate_management_system:6.1:*:*:*:*:*:*:*","matchCriteriaId":"A3F95B08-2AC6-4452-9BA3-26C80D3FABE7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"1676","Ordinal":"1","Title":"CVE-2008-1676","CVE":"CVE-2008-1676","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"1676","Ordinal":"1","NoteData":"Red Hat PKI Common Framework (rhpki-common) in Red Hat Certificate System (aka Certificate Server or RHCS) 7.1 through 7.3, and Netscape Certificate Management System 6.x, does not recognize Certificate Authority profile constraints on Extensions, which might allow remote attackers to bypass intended restrictions and conduct man-in-the-middle attacks by submitting a certificate signing request (CSR) and using the resulting certificate.","Type":"Description","Title":"CVE-2008-1676"},{"CveYear":"2008","CveId":"1676","Ordinal":"2","NoteData":"2008-07-07","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"1676","Ordinal":"3","NoteData":"2017-08-07","Type":"Other","Title":"Modified"}]}}}