#VU41343 Cryptographic issues in FortiOS


Published: 2014-09-10 | Updated: 2020-08-10

Vulnerability identifier: #VU41343

Vulnerability risk: Medium

CVSSv3.1: 5.5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-0351

CWE-ID: CWE-310

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
FortiOS
Operating systems & Components / Operating system

Vendor: Fortinet, Inc

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.x before 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle attackers to obtain sensitive information or interfere with communications by modifying the client-server data stream.

Mitigation
Install update from vendor's website.

Vulnerable software versions

FortiOS: 4.3.10 - 4.3.14, 5.0.0 - 5.0.7


External links
http://www.fortiguard.com/advisory/FG-IR-14-006/
http://www.kb.cert.org/vuls/id/730964
http://www.securityfocus.com/bid/69754
http://exchange.xforce.ibmcloud.com/vulnerabilities/96119


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability