Fortinet FortiOS 5.0.x < 5.0.4 Empty Device Group Firewall Bypass

Medium Nessus Plugin ID 85737


The remote host is affected by a security bypass vulnerability.


The remote host is running a version of Fortinet FortiOS 5.0.x prior to 5.0.4. It is, therefore, affected by a security bypass vulnerability due to an unspecified flaw that that is triggered during the handling of empty device groups. An unauthenticated, remote attacker can exploit this to bypass the device-based firewall policies.


Upgrade to Fortinet FortiOS 5.0.4 or later.

See Also

Plugin Details

Severity: Medium

ID: 85737

File Name: fortios_empty_device_group_firewall_bypass.nasl

Version: $Revision: 1.2 $

Type: local

Family: Firewalls

Published: 2015/09/02

Modified: 2015/09/03

Dependencies: 73522

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:fortinet:fortios

Required KB Items: Host/Fortigate/model, Host/Fortigate/version, Host/Fortigate/build

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2013/04/12

Vulnerability Publication Date: 2013/04/12

Reference Information

OSVDB: 125027