First published: Thu Dec 19 2024(Updated: )
A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiGate | <5.6.12<6.0.10<6.2.4<6.4.1 | |
Fortinet FortiOS IPS Engine | <5.6.13 | |
Fortinet FortiOS IPS Engine | >=6.0.0<6.0.11 | |
Fortinet FortiOS IPS Engine | >=6.2.0<6.2.5 | |
Fortinet FortiOS IPS Engine | >=6.4.0<6.4.2 |
Please upgrade to FortiOS versions 5.6.13 or above. Please upgrade to FortiOS versions 6.0.11 or above. Please upgrade to FortiOS versions 6.2.5 or above. Please upgrade to FortiOS versions 6.4.2 or above. Workaround: Disable tunnel mode.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12819 is rated as high severity due to its potential to allow remote attackers to crash the SSL VPN daemon.
To fix CVE-2020-12819, upgrade to the latest FortiGate firmware version that is greater than 5.6.13, 6.0.11, 6.2.5, or 6.4.2.
CVE-2020-12819 affects FortiGate versions 5.6.12, 6.0.10, 6.2.4, and 6.4.1 and earlier.
No, CVE-2020-12819 requires valid SSL VPN credentials for exploitation.
CVE-2020-12819 is classified as a heap-based buffer overflow vulnerability.