Fortinet FortiOS SSH Undocumented Interactive Login Vulnerability

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The SSH server running on the remote host can be logged into using
default SSH credentials.

Description :

The SSH server running on the remote host can be logged into using
default SSH credentials. The 'Fortimanager_Access' account has a
password based on the string 'FGTAbc11*xy+Qqz27' and a calculated hash
that is publicly known. A remote attacker can exploit this to gain
administrative access to the remote host.

See also :

http://www.nessus.org/u?0c2dcc56
http://seclists.org/fulldisclosure/2016/Jan/26

Solution :

Upgrade to Fortinet FortiOS 4.3.17 / 5.0.8 / 5.2.x / 5.4.x or later.
Alternatively, as a workaround, disable administrative access via SSH
on all interfaces.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Misc.

Nessus Plugin ID: 87896 ()

Bugtraq ID: 80581

CVE ID: CVE-2016-1909

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now