Red Hat / Dogtag Certificate System's Certificate Authority can be asked to decrypt one-time PIN used in the SCEP (Simple Certificate Enrollment Protocol) protocol requests. This feature is intended to be used by Registration Authorities that act as proxies between CA users (e.g. network devices enrolling using SCEP protocol) and CA itself. However, Red Hat Certificate System lacked proper authentication mechanisms to ensure such decryption requests are only replied if sent form the configured Registration Authority. An attacker able to sniff SCEP request of the network could use this flaw to request decryption of the sniffed request and obtain one-time PIN. Red Hat Certificate System updates add proper authentication, only configured authenticated Registration Authorities can request SCEP one-time PIN decryption.
This issue has been addressed in following products: Red Hat Certificate System 7.3 Via RHSA-2010:0837 https://rhn.redhat.com/errata/RHSA-2010-0837.html
This issue has been addressed in following products: Red Hat Certificate System 8 Via RHSA-2010:0838 https://rhn.redhat.com/errata/RHSA-2010-0838.html
https://fedorahosted.org/pki/changeset/1261