Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2014-0351 |
CWE-ID | CWE-310 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
FortiOS Operating systems & Components / Operating system |
Vendor | Fortinet, Inc |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU41343
Risk: Medium
CVSSv3.1: 5.5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2014-0351
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.x before 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle attackers to obtain sensitive information or interfere with communications by modifying the client-server data stream.
MitigationInstall update from vendor's website.
Vulnerable software versionsFortiOS: 4.3.10 - 5.0.7
CPE2.3 External linkshttp://www.fortiguard.com/advisory/FG-IR-14-006/
http://www.kb.cert.org/vuls/id/730964
http://www.securityfocus.com/bid/69754
http://exchange.xforce.ibmcloud.com/vulnerabilities/96119
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.