Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-9185 |
CWE-ID | CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
FortiOS Operating systems & Components / Operating system |
Vendor | Fortinet, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU13526
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-9185
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists in the SSL-VPN web portal of FortiOS due to the web portal returns the target user's login and password in plain text in a javascript file. A local attacker can bookmark a page in the SSL-VPN portal that uses single sign-on (SSO) and obtain the password.
MitigationUpdate to version 6.0.1.
Vulnerable software versionsFortiOS: 2.5 0mr4 - 6.0.0
CPE2.3http://fortiguard.com/psirt/FG-IR-18-027
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.