First published: Thu Nov 21 2019(Updated: )
Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eavesdrop on and modify information (URL/SPAM services in FortiOS 5.6, and URL/SPAM/AV services in FortiOS 6.0.; URL rating in FortiClient) sent and received from Fortiguard severs by decrypting these messages. Affected products include FortiClient for Windows 6.0.6 and below, FortiOS 6.0.7 and below, FortiClient for Mac OS 6.2.1 and below.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | <=6.0.6 | |
Fortinet Forticlient | <=6.2.1 | |
Fortinet FortiOS | <=6.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9195 is a vulnerability involving the use of a hardcoded cryptographic key in the FortiGuard services communication protocol, allowing a Man-in-the-Middle attack.
A Man-in-the-Middle attacker with knowledge of the hardcoded key can eavesdrop on and modify information sent and received through the affected FortiGuard services.
FortiClient for Windows versions up to and including 6.0.6, FortiClient for macOS versions up to and including 6.2.1, and FortiOS versions up to and including 6.0.6 are affected.
The severity of CVE-2018-9195 is medium, with a CVSS severity score of 5.9.
More information about CVE-2018-9195 can be found at the following URL: https://fortiguard.com/advisory/FG-IR-18-100