First published: Thu Apr 26 2018(Updated: )
Users' VPN authentication credentials are unsafely encrypted in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2335 and below versions, due to the use of a static encryption key and weak encryption algorithms.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | <=5.6.0 | |
Fortinet Forticlient | <=5.6.0 | |
Fortinet Forticlient Sslvpn Client | <=4.4.2335 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17543 is a vulnerability in Fortinet FortiClient for Windows, Mac OSX, and Linux that allows for unsafely encrypted VPN authentication credentials.
Fortinet FortiClient for Windows versions up to and including 5.6.0, FortiClient for Mac OSX versions up to and including 5.6.0, and FortiClient SSLVPN Client for Linux versions up to and including 4.4.2335 are affected by CVE-2017-17543.
CVE-2017-17543 has a severity rating of 7.5, which is considered high.
Users' VPN authentication credentials in Fortinet FortiClient are unsafely encrypted due to the use of a static encryption key and weak encryption methods.
Yes, Fortinet has released fixes and patches for the affected versions of FortiClient. It is recommended to update to the latest version to mitigate this vulnerability.