First published: Thu Apr 25 2019(Updated: )
A cleartext transmission of sensitive information vulnerability in Fortinet FortiManager 5.2.0 through 5.2.7, 5.4.0 and 5.4.1 may allow an unauthenticated attacker in a man in the middle position to retrieve the admin password via intercepting REST API JSON responses.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | >=5.2.0<=5.2.7 | |
Fortinet FortiManager | =5.4.0 | |
Fortinet FortiManager | =5.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1360 is a vulnerability in Fortinet FortiManager versions 5.2.0 through 5.2.7, 5.4.0, and 5.4.1 that allows an unauthenticated attacker to retrieve the admin password.
CVE-2018-1360 affects Fortinet FortiManager versions 5.2.0 through 5.2.7, 5.4.0, and 5.4.1 by enabling an unauthenticated attacker in a man-in-the-middle position to intercept REST API JSON responses and retrieve the admin password.
CVE-2018-1360 has a severity score of 8.1, which is considered high.
To fix CVE-2018-1360, it is recommended to update Fortinet FortiManager to a version that is not affected by the vulnerability.
You can find more information about CVE-2018-1360 on the following websites: SecurityFocus (http://www.securityfocus.com/bid/108079) and FortiGuard (https://fortiguard.com/advisory/FG-IR-18-051).