Executive Summary

Summary
Title FortiNet FortiGate and FortiWiFi appliances contain multiple vulnerabilities
Informations
Name VU#730964 First vendor Publication 2014-09-19
Vendor VU-CERT Last vendor Modification 2014-09-19
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#730964

FortiNet FortiGate and FortiWiFi appliances contain multiple vulnerabilities

Original Release date: 19 Sep 2014 | Last revised: 19 Sep 2014

Overview

Fortinet FortiGate and FortiWiFi appliances are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122).

Description

Fortinet FortiGate and FortiWiFi 4.00.6 and possibly earlier versions are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122). The vulnerabilities exist in the FortiManager service running on TCP port 541.

CWE-300: Channel Accessible by Non-Endpoint ('Man-in-the-Middle') - CVE-2014-0351
The FortiManager remote service relies on client-side SSL certificates to encrypt traffic between the client and server. It is possible for a client to specify the SSL cipher suite to use for the connection, including a cipher suite that does not use certificates for authentication, such as ADH-AES256-SHA. This could allow an adjacent unprivileged attacker to man-in-the-middle communications between the client and FortiManager service.

CWE-122: Heap-based Buffer Overflow - CVE-2014-2216
The FortiManager remote service uses a protocol with a message format that will allocate space for eight argument pointers on the heap. However, when parsing the message format an arbitrary number of argument pointers are accepted. This can cause a heap-based buffer overflow. A remote, unprivileged attacker may be able to exploit this vulnerability to run arbitrary code on the appliance.

The CVSS score reflects CVE-2014-2216.

Impact

A remote unauthenticated attacker may be able to man-in-the-middle traffic between the client and FortiManager service or execute arbitrary code on the appliance.

Solution

Fortinet recommends upgrading to FortiOS 4.3.16, 5.0.8, or 5.2.0 to receive the patch. Additionally, please consider the following workaround.

Disable the remote management service

The FortiManager remote service that runs on port 541 can be disabled.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Fortinet, Inc.Affected-10 Apr 2014
RecurityUnknown07 May 201407 May 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base5.1AV:N/AC:H/Au:N/C:P/I:P/A:P
Temporal3.8E:U/RL:OF/RC:C
Environmental0.9CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

  • https://cwe.mitre.org/data/definitions/122.html
  • https://cwe.mitre.org/data/definitions/300.html
  • http://www.fortiguard.com/advisory/FG-IR-14-006/

Credit

Thanks to Gregor Kopf of Recurity Labs GmbH for reporting this vulnerability.

This document was written by Jared Allar and Todd Lewellen.

Other Information

  • CVE IDs:CVE-2014-0351CVE-2014-2216
  • Date Public:19 Aug 2014
  • Date First Published:19 Sep 2014
  • Date Last Updated:19 Sep 2014
  • Document Revision:27

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/730964

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-310 Cryptographic Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 113

Nessus® Vulnerability Scanner

Date Description
2014-09-30 Name : The remote host is affected by multiple vulnerabilities.
File : fortios_FG-IR-14-006.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-10-01 13:27:26
  • Multiple Updates
2014-09-19 21:22:14
  • First insertion