CVE-2018-9195

Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eavesdrop on and modify information (URL/SPAM services in FortiOS 5.6, and URL/SPAM/AV services in FortiOS 6.0.; URL rating in FortiClient) sent and received from Fortiguard severs by decrypting these messages. Affected products include FortiClient for Windows 6.0.6 and below, FortiOS 6.0.7 and below, FortiClient for Mac OS 6.2.1 and below.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-18-100 Third Party Advisory
https://fortiguard.com/advisory/FG-IR-18-100 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*
cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:15

Type Values Removed Values Added
References () https://fortiguard.com/advisory/FG-IR-18-100 - Third Party Advisory () https://fortiguard.com/advisory/FG-IR-18-100 - Third Party Advisory

Information

Published : 2019-11-21 15:15

Updated : 2024-11-21 04:15


NVD link : CVE-2018-9195

Mitre link : CVE-2018-9195

CVE.ORG link : CVE-2018-9195


JSON object : View

Products Affected

fortinet

  • forticlient
  • fortios
CWE
CWE-798

Use of Hard-coded Credentials