Blog | G5 Cyber Security

NetNanny Found Using Shared Private Key, Root CA

An issue with NetNanny could open users systems up to man-in-the-middle (MiTM) attacks, HTTPS spoofing and intercept, researchers warned Monday. The internet filtering service is primarily used by parents to control their children s online activity. The service is broadly vulnerable to HTTPS spoofs since it uses a shared private key and root certificate authority. Users could get tricked into thinking they were visiting a safe, HTTPS site when in actuality its certificate could be spoofed.

Source: https://threatpost.com/netnanny-found-using-shared-private-key-root-ca/112354/

Exit mobile version