Fortinet FortiOS 4.1.x < 4.1.11 / 4.2.x < 4.2.13 / 4.3.x < 4.3.9 Web Interface Cookie Parser RCE (EGREGIOUSBLUNDER)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a remote code execution vulnerability.

Description :

The remote FortiGate device is running a version of FortiOS that is
4.1.x prior to 4.1.11, 4.2.x prior to 4.2.13, or 4.3.x prior to 4.3.9.
It is, therefore, affected by a remote code execution vulnerability,
known as EGREGIOUSBLUNDER, in the web interface due to improper
validation when parsing cookies. An unauthenticated, remote attacker
can exploit this, via a specially crafted HTTP request, to cause a
buffer overflow condition, resulting in a denial of service condition
or the execution of arbitrary code.


EGREGIOUSBLUNDER is one of multiple Equation Group vulnerabilities and
exploits disclosed on 2016/08/14 by a group known as the Shadow
Brokers.

See also :

http://fortiguard.com/advisory/FG-IR-16-023
http://www.nessus.org/u?4c7e0cf3

Solution :

Upgrade to Fortinet FortiOS 4.1.11 / 4.2.13 / 4.3.9 / 5.0 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 93128 ()

Bugtraq ID: 92523

CVE ID: CVE-2016-6909

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now