VAR-201409-0388
Vulnerability from variot - Updated: 2023-12-18 13:29The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.x before 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle attackers to obtain sensitive information or interfere with communications by modifying the client-server data stream. Fortinet FortiGate and FortiWiFi appliances are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122). In addition, JVNVU#96848844 Then CWE-300 and CWE-122 Published as. CWE-300: Channel Accessible by Non-Endpoint ('Man-in-the-Middle') http://cwe.mitre.org/data/definitions/300.html CWE-122: Heap-based Buffer Overflow http://cwe.mitre.org/data/definitions/122.htmlMan-in-the-middle attack (man-in-the-middle attack) By changing the data stream between client and server, important information may be obtained or communication may be interrupted. Fortinet FortiOS is prone to an information-disclosure vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks and disclose sensitive information. Successful exploits will lead to other attacks. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam. There is a security vulnerability in the Fortinet FortiOS 4.3.15 and earlier versions and FortiManager protocol service of FortiManager 5.x versions earlier than 5.0.8 on FortiGate devices. The vulnerability stems from the fact that the program does not verify the use of anonymous cipher suites
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201409-0388",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "4.3.10"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "5.0.4"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "5.0.6"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "4.3.12"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "4.3.13"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "5.0.0"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "5.0.5"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "5.0.7"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.6,
"vendor": "fortinet",
"version": "5.0.3"
},
{
"model": "fortios",
"scope": "lte",
"trust": 1.0,
"vendor": "fortinet",
"version": "4.3.15"
},
{
"model": "fortios",
"scope": "eq",
"trust": 1.0,
"vendor": "fortinet",
"version": "4.3.14"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fortinet",
"version": null
},
{
"model": "fortios",
"scope": "eq",
"trust": 0.8,
"vendor": "fortinet",
"version": "5.0.8"
},
{
"model": "fortios",
"scope": "lt",
"trust": 0.8,
"vendor": "fortinet",
"version": "5.x"
},
{
"model": "fortios",
"scope": "eq",
"trust": 0.6,
"vendor": "fortinet",
"version": "4.3.15"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730964"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:4.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:4.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:4.3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:4.3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "4.3.15",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0351"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Gregor Kopf (Recurity Labs)",
"sources": [
{
"db": "BID",
"id": "69754"
}
],
"trust": 0.3
},
"cve": "CVE-2014-0351",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 5.5,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Adjacent Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.4,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2014-0351",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 5.5,
"id": "VHN-67844",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:A/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-0351",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201409-466",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-67844",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-67844"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.x before 5.0.8 on FortiGate devices does not prevent use of anonymous ciphersuites, which makes it easier for man-in-the-middle attackers to obtain sensitive information or interfere with communications by modifying the client-server data stream. Fortinet FortiGate and FortiWiFi appliances are susceptible to man-in-the-middle attacks (CWE-300) and a heap-based overflow vulnerability (CWE-122). In addition, JVNVU#96848844 Then CWE-300 and CWE-122 Published as. CWE-300: Channel Accessible by Non-Endpoint (\u0027Man-in-the-Middle\u0027) http://cwe.mitre.org/data/definitions/300.html CWE-122: Heap-based Buffer Overflow http://cwe.mitre.org/data/definitions/122.htmlMan-in-the-middle attack (man-in-the-middle attack) By changing the data stream between client and server, important information may be obtained or communication may be interrupted. Fortinet FortiOS is prone to an information-disclosure vulnerability. \nAn attacker can exploit this issue to perform man-in-the-middle attacks and disclose sensitive information. Successful exploits will lead to other attacks. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam. There is a security vulnerability in the Fortinet FortiOS 4.3.15 and earlier versions and FortiManager protocol service of FortiManager 5.x versions earlier than 5.0.8 on FortiGate devices. The vulnerability stems from the fact that the program does not verify the use of anonymous cipher suites",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"db": "CERT/CC",
"id": "VU#730964"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"db": "BID",
"id": "69754"
},
{
"db": "VULHUB",
"id": "VHN-67844"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-0351",
"trust": 2.8
},
{
"db": "CERT/CC",
"id": "VU#730964",
"trust": 2.2
},
{
"db": "BID",
"id": "69754",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVNVU96848844",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201409-466",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-67844",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730964"
},
{
"db": "VULHUB",
"id": "VHN-67844"
},
{
"db": "BID",
"id": "69754"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
]
},
"id": "VAR-201409-0388",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-67844"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:29:43.853000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "FortiGate Vulnerabilities in FortiManager Service",
"trust": 0.8,
"url": "http://www.fortiguard.com/advisory/fg-ir-14-006/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.9
},
{
"problemtype": "CWE-300",
"trust": 0.8
},
{
"problemtype": "CWE-122",
"trust": 0.8
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730964"
},
{
"db": "VULHUB",
"id": "VHN-67844"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"db": "NVD",
"id": "CVE-2014-0351"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://www.fortiguard.com/advisory/fg-ir-14-006/"
},
{
"trust": 1.4,
"url": "http://www.kb.cert.org/vuls/id/730964"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/69754"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96119"
},
{
"trust": 0.8,
"url": "https://cwe.mitre.org/data/definitions/122.html"
},
{
"trust": 0.8,
"url": "https://cwe.mitre.org/data/definitions/300.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0351"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu96848844/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0351"
},
{
"trust": 0.3,
"url": "https://www.fortinet.com/products/fortigate/fortios.html"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730964"
},
{
"db": "VULHUB",
"id": "VHN-67844"
},
{
"db": "BID",
"id": "69754"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#730964"
},
{
"db": "VULHUB",
"id": "VHN-67844"
},
{
"db": "BID",
"id": "69754"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-09-19T00:00:00",
"db": "CERT/CC",
"id": "VU#730964"
},
{
"date": "2014-09-10T00:00:00",
"db": "VULHUB",
"id": "VHN-67844"
},
{
"date": "2014-09-08T00:00:00",
"db": "BID",
"id": "69754"
},
{
"date": "2014-09-12T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"date": "2014-09-10T18:55:02.643000",
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"date": "2014-09-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-09-19T00:00:00",
"db": "CERT/CC",
"id": "VU#730964"
},
{
"date": "2017-08-29T00:00:00",
"db": "VULHUB",
"id": "VHN-67844"
},
{
"date": "2014-09-22T18:18:00",
"db": "BID",
"id": "69754"
},
{
"date": "2014-09-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004144"
},
{
"date": "2017-08-29T01:34:08.623000",
"db": "NVD",
"id": "CVE-2014-0351"
},
{
"date": "2014-09-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "FortiNet FortiGate and FortiWiFi appliances contain multiple vulnerabilities",
"sources": [
{
"db": "CERT/CC",
"id": "VU#730964"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201409-466"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.