CVE-2015-1570

The Endpoint Control protocol implementation in Fortinet FortiClient 5.2.3.091 for Android and 5.2.028 for iOS does not validate certificates, which makes it easier for man-in-the-middle attackers to spoof servers via a crafted certificate.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:forticlient:5.2.3.091:*:*:*:*:android:*:*
cpe:2.3:a:fortinet:forticlient:5.2.028:*:*:*:*:ios:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2015/Jan/124 - Exploit () http://seclists.org/fulldisclosure/2015/Jan/124 - Exploit
References () http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf - Exploit () http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf - Exploit

Information

Published : 2015-02-10 20:59

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1570

Mitre link : CVE-2015-1570

CVE.ORG link : CVE-2015-1570


JSON object : View

Products Affected

fortinet

  • forticlient
CWE
CWE-310

Cryptographic Issues