First published: Tue Feb 10 2015(Updated: )
The Endpoint Control protocol implementation in Fortinet FortiClient 5.2.3.091 for Android and 5.2.028 for iOS does not validate certificates, which makes it easier for man-in-the-middle attackers to spoof servers via a crafted certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient | =5.2.3.091 | |
Fortinet FortiClient | =5.2.028 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1570 has a medium severity rating due to its potential for man-in-the-middle attacks.
CVE-2015-1570 allows attackers to spoof servers by exploiting the lack of certificate validation in Fortinet FortiClient.
CVE-2015-1570 affects FortiClient version 5.2.3.091 for Android and 5.2.028 for iOS.
To mitigate CVE-2015-1570, update FortiClient to the latest version that includes fixes for certificate validation.
CVE-2015-1570 remains a risk for users who have not updated their FortiClient software to address this vulnerability.