Fortinet FortiClient < 6.2.0 Information Disclosure MitM (FG-IR-18-100)

medium Nessus Plugin ID 131285

Synopsis

The remote Windows host is affected by an information disclosure vulnerability.

Description

The remote host is running a version of Fortinet FortiClient prior to 6.2.0. It is, therefore, affected by an information disclosure man-in-the-middle vulnerability in the FortiGuard services communication protocol due to the use of a hardcoded cryptographic key. A remote attacker with knowledge of the hardcoded key can exploit this via the network to eavesdrop and modify information sent and received from FortiGuard servers.

Solution

Upgrade to Fortinet FortiClient 6.2.0 or later.

See Also

https://fortiguard.com/psirt/FG-IR-18-100

http://www.nessus.org/u?ca502f28

Plugin Details

Severity: Medium

ID: 131285

File Name: forticlient_6_2_0.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 11/25/2019

Updated: 11/27/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-9195

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:fortinet:forticlient

Required KB Items: installed_sw/FortiClient

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/16/2019

Vulnerability Publication Date: 11/21/2019

Reference Information

CVE: CVE-2018-9195