Vulnerability identifier: #VU41343
Vulnerability risk: Medium
CVSSv3.1: 5.5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-310
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
FortiOS
Operating systems & Components /
Operating system
Vendor: Fortinet, Inc
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.x before 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle attackers to obtain sensitive information or interfere with communications by modifying the client-server data stream.
Mitigation
Install update from vendor's website.
Vulnerable software versions
FortiOS: 4.3.10 - 4.3.14, 5.0.0 - 5.0.7
External links
http://www.fortiguard.com/advisory/FG-IR-14-006/
http://www.kb.cert.org/vuls/id/730964
http://www.securityfocus.com/bid/69754
http://exchange.xforce.ibmcloud.com/vulnerabilities/96119
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.