Fortinet FortiOS 5.2.x < 5.2.10 / 5.4.1 < 5.4.2 Local Password Hash Disclosure (FG-IR-16-050)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a local information disclosure
vulnerability.

Description :

The remote FortiGate device is running a version of FortiOS that is
5.2.x prior to 5.2.10, or else it is running version 5.4.1. It is,
therefore, affected by a local information disclosure vulnerability
due to a failure to properly protect password hashes stored on the
device. A local attacker can exploit this to obtain password hashes of
other users on the device, allowing the attacker to possibly obtain
user passwords, including the passwords of super-admin users.

See also :

http://fortiguard.com/advisory/FG-IR-16-050
https://labs.mwrinfosecurity.com/advisories/fortigate-hash/
https://tools.cisco.com/security/center/viewAlert.x?alertId=50993

Solution :

Upgrade to Fortinet FortiOS 5.2.10 / 5.4.2 or later.

Risk factor :

Low / CVSS Base Score : 2.1
(CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 1.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 97066 ()

Bugtraq ID: 94690

CVE ID: CVE-2016-7542

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now