Vulnerability identifier: #VU40678
Vulnerability risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-310
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
FortiOS
Operating systems & Components /
Operating system
Vendor: Fortinet, Inc
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
FortiOS 5.0.x before 5.0.12 and 5.2.x before 5.2.4 supports anonymous, export, RC4, and possibly other weak ciphers when using TLS to connect to FortiGuard servers, which allows man-in-the-middle attackers to spoof TLS content by modifying packets.
Mitigation
Install update from vendor's website.
Vulnerable software versions
FortiOS: 5.0.0 - 5.0.11, 5.2.0 - 5.2.3
External links
http://fortiguard.com/advisory/2015-07-24-weak-ciphers-suites-are-presented-towards-fortiguard-servers
http://www.fortiguard.com/advisory/FG-IR-15-021/
http://www.securitytracker.com/id/1033092
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.