Overview
Fortinet FortiGate and FortiWiFi appliances are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122).
Description
Fortinet FortiGate and FortiWiFi 4.00.6 and possibly earlier versions are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122). The vulnerabilities exist in the FortiManager service running on TCP port 541. CWE-300: Channel Accessible by Non-Endpoint ('Man-in-the-Middle') - CVE-2014-0351 |
Impact
A remote unauthenticated attacker may be able to man-in-the-middle traffic between the client and FortiManager service or execute arbitrary code on the appliance. |
Solution
Fortinet recommends upgrading to FortiOS 4.3.16, 5.0.8, or 5.2.0 to receive the patch. Additionally, please consider the following workaround. |
Disable the remote management service |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P |
| Temporal | 3.8 | E:U/RL:OF/RC:C |
| Environmental | 0.9 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Gregor Kopf of Recurity Labs GmbH for reporting this vulnerability.
This document was written by Jared Allar and Todd Lewellen.
Other Information
| CVE IDs: | CVE-2014-0351, CVE-2014-2216 |
| Date Public: | 2014-08-19 |
| Date First Published: | 2014-09-19 |
| Date Last Updated: | 2014-09-19 16:05 UTC |
| Document Revision: | 29 |