First published: Tue Feb 10 2015(Updated: )
** DISPUTED ** The CAPWAP DTLS protocol implementation in Fortinet FortiOS 5.0 Patch 7 build 4457 uses the same certificate and private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the Fortinet_Factory certificate and private key. NOTE: FG-IR-15-002 says "The Fortinet_Factory certificate is unique to each device ... An attacker cannot therefore stage a MitM attack."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | =5.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1571 is considered moderate in severity due to its potential for man-in-the-middle attacks.
To fix CVE-2015-1571, update FortiOS to a version that eliminates the shared certificate and key issue.
CVE-2015-1571 affects Fortinet FortiOS version 5.0.7, which uses a common DTLS certificate across different installations.
CVE-2015-1571 can allow man-in-the-middle attackers to spoof SSL servers, potentially intercepting traffic.
While CVE-2015-1571 was reported in 2015, systems running the affected FortiOS version may still be at risk if not updated.