One question though, is whether the key was compromised at the time of
intentionally shipping​ it in a distributed executable. That choice
knowingly exposed the key to arbitrary public users, even if they didn't
expect this to happen from doing so.

-- Eric

On Jun 18, 2017 10:24 AM, "Ryan Sleevi via dev-security-policy" <
[email protected]> wrote:

> As Daniel noted, this is considered a key compromise event, and a violation
> of the subscriber agreement that all CAs are required to adhere to, with
> respect to the protection of the private key.
>
> The issuing CA is obligated to revoke this certificate within 24 hours of
> being made aware of this.
>
> Thank you for bringing it to the community's attention.
>
> On Sun, Jun 18, 2017 at 12:29 PM Daniel Cater via dev-security-policy <
> [email protected]> wrote:
>
> > This is now on crt.sh here:
> > https://crt.sh/?id=156475584&opt=cablint,x509lint
> >
> > This is indeed a key compromise event, thanks for the level of detail
> > provided.
> >
> > An attacker in control of a network could use this to impersonate
> > https://drmlocal.cisco.com/ and leverage that to potentially steal a
> > user's secure cookies from other Cisco subdomains if they were scoped to
> > the whole cisco.com domain.
> > _______________________________________________
> > dev-security-policy mailing list
> > [email protected]
> > https://lists.mozilla.org/listinfo/dev-security-policy
> >
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy
>
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to