First published: Thu Mar 30 2017(Updated: )
Long lived sessions in Fortinet FortiGate devices with FortiOS 5.x before 5.4.0 could violate a security policy during IPS signature updates when the FortiGate's IPSengine is configured in flow mode. All FortiGate versions with IPS configured in proxy mode (the default mode) are not affected.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | =5.0.0 | |
Fortinet FortiOS | =5.0.1 | |
Fortinet FortiOS | =5.0.2 | |
Fortinet FortiOS | =5.0.3 | |
Fortinet FortiOS | =5.0.4 | |
Fortinet FortiOS | =5.0.5 | |
Fortinet FortiOS | =5.0.6 | |
Fortinet FortiOS | =5.0.7 | |
Fortinet FortiOS | =5.0.8 | |
Fortinet FortiOS | =5.0.9 | |
Fortinet FortiOS | =5.0.10 | |
Fortinet FortiOS | =5.0.11 | |
Fortinet FortiOS | =5.0.12 | |
Fortinet FortiOS | =5.0.13 | |
Fortinet FortiOS | =5.0.14 | |
Fortinet FortiOS | =5.2.0 | |
Fortinet FortiOS | =5.2.1 | |
Fortinet FortiOS | =5.2.2 | |
Fortinet FortiOS | =5.2.3 | |
Fortinet FortiOS | =5.2.4 | |
Fortinet FortiOS | =5.2.5 | |
Fortinet FortiOS | =5.2.6 | |
Fortinet FortiOS | =5.2.7 | |
Fortinet FortiOS | =5.2.8 | |
Fortinet FortiOS | =5.2.9 | |
Fortinet FortiOS | =5.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.