First published: Tue Aug 20 2019(Updated: )
Forcepoint Next Generation Firewall (Forcepoint NGFW) 6.4.x before 6.4.7, 6.5.x before 6.5.4, and 6.6.x before 6.6.2 has a serious authentication vulnerability that potentially allows unauthorized users to bypass password authentication and access services protected by the NGFW Engine. The vulnerability affects the following NGFW features when the LDAP authentication method is used as the backend authentication: IPsec VPN, SSL VPN or Browser-based user authentication. The vulnerability does not apply when any other backend authentication is used. The RADIUS authentication method is not vulnerable, for example.
Credit: psirt@forcepoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Forcepoint Next Generation Firewall | >=6.4.0<6.4.7 | |
Forcepoint Next Generation Firewall | >=6.5.0<6.5.4 | |
Forcepoint Next Generation Firewall | >=6.6.0<6.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6143 is a serious authentication vulnerability in Forcepoint Next Generation Firewall (NGFW) versions 6.4.x before 6.4.7, 6.5.x before 6.5.4, and 6.6.x before 6.6.2. It allows unauthorized users to bypass password authentication and access protected services.
The severity of CVE-2019-6143 is critical, with a CVSS score of 9.1.
CVE-2019-6143 affects Forcepoint NGFW versions 6.4.x before 6.4.7, 6.5.x before 6.5.4, and 6.6.x before 6.6.2, allowing unauthorized users to bypass password authentication and access protected services.
To fix CVE-2019-6143, update your Forcepoint NGFW to version 6.4.7 or later, 6.5.4 or later, or 6.6.2 or later.
For more information about CVE-2019-6143, you can visit the following link: https://help.forcepoint.com/security/CVE/CVE-2019-6143.html