Fortinet FortiOS 5.0.x < 5.0.12 / 5.2.x < 5.2.4 Weak Ciphers (FG-IR-15-021)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote host supports weak ciphers

Description :

The remote host is running a version of Fortinet FortiOS that is 5.0.x
prior to 5.0.12 or 5.2.x prior 5.2.4. It is, therefore, affected by a
flaw when connecting to a FortiGuard server via TLS due to the support
of weak ciphers such as anonymous, export, and RC4. A
man-in-the-middle attacker can exploit this to downgrade the TLS
cipher suite and conduct attacks on the TLS connection.

See also :

http://www.fortiguard.com/advisory/FG-IR-15-021

Solution :

Upgrade to Fortinet FortiOS 5.0.12 / 5.2.4 or later.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 85911 ()

Bugtraq ID: 76047

CVE ID: CVE-2015-2323

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now