Overview
Fortinet FortiGate and FortiWiFi appliances are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122).
Description
Fortinet FortiGate and FortiWiFi 4.00.6 and possibly earlier versions are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122). The vulnerabilities exist in the FortiManager service running on TCP port 541. CWE-300: Channel Accessible by Non-Endpoint ('Man-in-the-Middle') - CVE-2014-0351 |
Impact
A remote unauthenticated attacker may be able to man-in-the-middle traffic between the client and FortiManager service or execute arbitrary code on the appliance. |
Solution
Fortinet recommends upgrading to FortiOS 4.3.16, 5.0.8, or 5.2.0 to receive the patch. Additionally, please consider the following workaround. |
Disable the remote management service |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P |
Temporal | 3.8 | E:U/RL:OF/RC:C |
Environmental | 0.9 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Gregor Kopf of Recurity Labs GmbH for reporting this vulnerability.
This document was written by Jared Allar and Todd Lewellen.
Other Information
CVE IDs: | CVE-2014-0351, CVE-2014-2216 |
Date Public: | 2014-08-19 |
Date First Published: | 2014-09-19 |
Date Last Updated: | 2014-09-19 16:05 UTC |
Document Revision: | 29 |