The CAPWAP DTLS protocol implementation in Fortinet FortiOS 5.0 Patch 7 build 4457 uses the same certificate and private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the Fortinet_Factory certificate and private key. NOTE: FG-IR-15-002 says "The Fortinet_Factory certificate is unique to each device ... An attacker cannot therefore stage a MitM attack.
References
Configurations
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2015/Jan/125 - Exploit | |
References | () http://www.fortiguard.com/advisory/FG-IR-15-002/ - Vendor Advisory | |
References | () http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiOS_Multiple_Vulnerabilities.pdf - Exploit |
07 Nov 2023, 02:24
Type | Values Removed | Values Added |
---|---|---|
Summary | The CAPWAP DTLS protocol implementation in Fortinet FortiOS 5.0 Patch 7 build 4457 uses the same certificate and private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the Fortinet_Factory certificate and private key. NOTE: FG-IR-15-002 says "The Fortinet_Factory certificate is unique to each device ... An attacker cannot therefore stage a MitM attack. |
Information
Published : 2015-02-10 20:59
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1571
Mitre link : CVE-2015-1571
CVE.ORG link : CVE-2015-1571
JSON object : View
Products Affected
fortinet
- fortios
CWE
CWE-310
Cryptographic Issues