First published: Tue Jun 04 2019(Updated: )
An improper access control vulnerability in FortiProxy SSL VPN web portal may allow an unauthenticated and remote attacker to change local SSL-VPN users' passwords via specially crafted HTTP requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=5.4.1<=5.4.10 | |
Fortinet FortiOS | >=5.6.0<=5.6.8 | |
Fortinet FortiOS | >=6.0.0<=6.0.4 | |
Fortinet FortiOS and FortiProxy | ||
Fortinet FortiProxy | <1.2.9 | |
Fortinet FortiProxy | =2.0.0 | |
Fortinet FortiOS | >=5.4.1<5.4.11 | |
Fortinet FortiOS | >=5.6.0<5.6.9 | |
Fortinet FortiOS | >=6.0.0<6.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-13382 is critical with a severity value of 9.1.
The affected software for CVE-2018-13382 is Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8, and 5.4.1 to 5.4.10, as well as FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, and 1.0.0 to 1.0.7.
CVE-2018-13382 allows an unauthenticated attacker to modify the password of an SSL VPN web portal user.
To fix CVE-2018-13382, it is recommended to apply the necessary security patches provided by Fortinet.
You can find more information about CVE-2018-13382 on the FortiGuard advisory FG-IR-18-389 and the FortiGuard PSIRT advisory FG-IR-20-231.