First published: Wed Feb 08 2017(Updated: )
The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | <=4.3.18 | |
FortiOS | =4.3.0 | |
FortiOS | =4.3.10 | |
FortiOS | =4.3.12 | |
FortiOS | =4.3.13 | |
FortiOS | =4.3.14 | |
FortiOS | =4.3.15 | |
FortiOS | =4.3.16 | |
FortiOS | =4.3.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8492 is classified as a high-severity vulnerability due to its potential to allow unauthorized data access.
To fix CVE-2016-8492, upgrade FortiOS to the latest version that addresses this vulnerability.
CVE-2016-8492 affects FortiOS versions up to 4.3.18 as well as specific versions like 4.3.0, 4.3.10, 4.3.12, 4.3.13, 4.3.14, 4.3.15, 4.3.16, and 4.3.17.
CVE-2016-8492 can be exploited through unauthorized access via IPSec or TLS decryption, allowing attackers to read sensitive data.
There is no official workaround for CVE-2016-8492, and it is recommended to apply the necessary updates to mitigate the risk.