First published: Wed Sep 05 2018(Updated: )
A plaintext recovery of encrypted messages or a Man-in-the-middle (MiTM) attack on RSA PKCS #1 v1.5 encryption may be possible without knowledge of the server's private key. Fortinet FortiOS 5.4.6 to 5.4.9, 6.0.0 and 6.0.1 are vulnerable by such attack under SSL Deep Inspection feature when CPx being used.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=5.4.6<=5.4.9 | |
Fortinet FortiOS | =6.0.0 | |
Fortinet FortiOS | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9192 has a high severity rating due to the potential for plaintext recovery of encrypted messages.
To fix CVE-2018-9192, upgrade Fortinet FortiOS to a version beyond 6.0.1 or 5.4.9.
CVE-2018-9192 affects Fortinet FortiOS versions 5.4.6 to 5.4.9, as well as versions 6.0.0 and 6.0.1.
CVE-2018-9192 enables plaintext recovery of encrypted messages and allows for Man-in-the-middle (MiTM) attacks.
Yes, the vulnerability in CVE-2018-9192 is specifically associated with the SSL Deep Inspection feature of FortiOS.