Fortinet FortiOS 5.x < 5.0.3 Security Bypass

medium Nessus Plugin ID 73526

Synopsis

The remote host is affected by a security bypass vulnerability.

Description

The remote host is running FortiOS 5.x prior to 5.0.3. It is, therefore, affected by a security bypass vulnerability due to a failure to properly manage the Guest user permission. An attacker could potentially exploit this vulnerability to view, change, or delete records of users from another group.

Solution

Upgrade to Fortinet FortiOS 5.0.3 or later.

See Also

http://www.fortiguard.com/advisory/FGA-2013-20

Plugin Details

Severity: Medium

ID: 73526

File Name: fortios_FGA-2013-20.nasl

Version: 1.3

Type: local

Family: Firewalls

Published: 4/15/2014

Updated: 7/11/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:fortinet:fortios

Required KB Items: Host/Fortigate/model, Host/Fortigate/version, Host/Fortigate/build

Exploit Ease: No known exploits are available

Patch Publication Date: 6/3/2013

Vulnerability Publication Date: 6/13/2013

Reference Information

CVE: CVE-2013-4604

BID: 60571