#VU40678 Cryptographic issues in FortiOS


Published: 2015-08-11 | Updated: 2020-08-09

Vulnerability identifier: #VU40678

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-2323

CWE-ID: CWE-310

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
FortiOS
Operating systems & Components / Operating system

Vendor: Fortinet, Inc

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

FortiOS 5.0.x before 5.0.12 and 5.2.x before 5.2.4 supports anonymous, export, RC4, and possibly other weak ciphers when using TLS to connect to FortiGuard servers, which allows man-in-the-middle attackers to spoof TLS content by modifying packets.

Mitigation
Install update from vendor's website.

Vulnerable software versions

FortiOS: 5.0.0 - 5.0.11, 5.2.0 - 5.2.3


External links
http://fortiguard.com/advisory/2015-07-24-weak-ciphers-suites-are-presented-towards-fortiguard-servers
http://www.fortiguard.com/advisory/FG-IR-15-021/
http://www.securitytracker.com/id/1033092


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability