CVE-2016-8492

The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
References
Link Resource
http://www.securityfocus.com/bid/94480 Third Party Advisory VDB Entry
https://fortiguard.com/advisory/FG-IR-16-067 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.16:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.17:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-02-08 16:59

Updated : 2024-02-28 15:44


NVD link : CVE-2016-8492

Mitre link : CVE-2016-8492

CVE.ORG link : CVE-2016-8492


JSON object : View

Products Affected

fortinet

  • fortios
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor