First published: Mon Feb 13 2017(Updated: )
An improper certificate validation vulnerability in Fortinet FortiManager 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1 allows remote attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack via the Fortisandbox devices probing feature.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | =5.0.3 | |
Fortinet FortiManager | =5.0.4 | |
Fortinet FortiManager | =5.0.5 | |
Fortinet FortiManager | =5.0.6 | |
Fortinet FortiManager | =5.0.7 | |
Fortinet FortiManager | =5.0.8 | |
Fortinet FortiManager | =5.0.9 | |
Fortinet FortiManager | =5.0.10 | |
Fortinet FortiManager | =5.0.11 | |
Fortinet FortiManager | =5.2.0 | |
Fortinet FortiManager | =5.2.1 | |
Fortinet FortiManager | =5.2.2 | |
Fortinet FortiManager | =5.2.3 | |
Fortinet FortiManager | =5.2.4 | |
Fortinet FortiManager | =5.2.6 | |
Fortinet FortiManager | =5.2.7 | |
Fortinet FortiManager | =5.4.0 | |
Fortinet FortiManager | =5.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8495 is classified as a medium-severity vulnerability due to improper certificate validation.
To fix CVE-2016-8495, upgrade Fortinet FortiManager to the latest version that addresses this vulnerability.
CVE-2016-8495 affects Fortinet FortiManager versions 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1.
CVE-2016-8495 allows attackers to conduct man-in-the-middle (MITM) attacks by spoofing trusted entities.
Yes, CVE-2016-8495 can be exploited remotely, making it relatively easy for attackers to perform MITM attacks.