First published: Sun Mar 15 2020(Updated: )
An improper input validation vulnerability in FortiOS 6.2.1, 6.2.0, 6.0.8 and below until 5.4.0 under admin webUI may allow an attacker to perform an URL redirect attack via a specifically crafted request to the admin initial password change webpage.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=5.4.0<=6.0.8 | |
FortiOS | =6.2.0 | |
FortiOS | =6.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6696 has been classified with a medium severity level due to its potential for URL redirection attacks.
To remediate CVE-2019-6696, upgrade FortiOS to version 6.2.2 or later, or apply the relevant patches provided by Fortinet.
CVE-2019-6696 affects FortiOS versions 6.2.0, 6.2.1, and versions below 6.0.8 until 5.4.0.
CVE-2019-6696 allows attackers to perform an URL redirect attack via a specifically crafted request to the admin initial password change webpage.
No official workarounds are provided for CVE-2019-6696; it is recommended to upgrade FortiOS to resolve the vulnerability.