Based on another major Superfish update: Komodia client side SSL verification is broken!
The major problem with SSL Intercepting proxies (or any in-house crypto software) developed by OEMs or a third party like Komodia is that you can't really trust them (especially after the Superfish buzz)! TLDR of this new update: An attacker does not even need to extract the root keys for an MitM attack against the victims. Since Komodia's way of handling an invalid/untrusted/self-signed certificate is flawed, it is very easy to bypass the SSL cert validation process (by setting alternate names in a certificate). Check out the post linked above for details
Lesson Learned: Implementing crypto software (including intercepting proxies) is not an easy task. Proper design analysis (from multiple crypto experts), rigorous testing and assessments must be performed on such software before being used in production. Quoiting from an awesome answer to the question Why shouldn't we roll our own?:
You can roll your own, but you probably will make a major security
mistake if you are not an expert in security/cryptography or have had
your scheme analyzed by multiple experts. I'm more willing to bet on
an open-source publicly known encryption scheme that's out there for
all to see and analyze. More eyes means less likely that the current
version doesn't have major vulnerabilities than something developed
in-house by non-experts.