First published: Mon Feb 03 2020(Updated: )
An Uncontrolled Resource Consumption vulnerability in Fortinet FortiSwitch below 3.6.11, 6.0.6 and 6.2.2, FortiAnalyzer below 6.2.3, FortiManager below 6.2.3 and FortiAP-S/W2 below 6.2.2 may allow an attacker to cause admin webUI denial of service (DoS) via handling special crafted HTTP requests/responses in pieces slowly, as demonstrated by Slow HTTP DoS Attacks.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | <6.2.3 | |
Fortinet Fortiap-s | <6.2.2 | |
Fortinet FortiAP-W2 | <6.2.2 | |
Fortinet FortiManager | <6.2.3 | |
Fortinet FortiSwitch | <3.6.11 | |
Fortinet FortiSwitch | >=6.0.0<6.0.6 | |
Fortinet FortiSwitch | >=6.2.0<6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17657 is an Uncontrolled Resource Consumption vulnerability in Fortinet FortiSwitch below 3.6.11, 6.0.6, and 6.2.2, FortiAnalyzer below 6.2.3, FortiManager below 6.2.3, and FortiAP-S/W2 below 6.2.2.
The severity of CVE-2019-17657 is high with a CVSS score of 7.5.
CVE-2019-17657 may allow an attacker to cause admin webUI denial of service (DoS) by handling specially crafted HTTP requests.
Fortinet FortiSwitch versions below 3.6.11, 6.0.6, and 6.2.2, FortiAnalyzer versions below 6.2.3, FortiManager versions below 6.2.3, and FortiAP-S/W2 versions below 6.2.2 are affected by CVE-2019-17657.
To fix CVE-2019-17657, it is recommended to update Fortinet FortiSwitch to version 3.6.11, 6.0.6, or 6.2.2, FortiAnalyzer to version 6.2.3, FortiManager to version 6.2.3, and FortiAP-S/W2 to version 6.2.2 or higher.