An Insufficient Entropy in PRNG vulnerability in Fortinet FortiOS 6.2.1, 6.2.0, 6.0.8 and below for device not enable hardware TRNG token and models not support builtin TRNG seed allows attacker to theoretically recover the long term ECDSA secret in a TLS client with a RSA handshake and mutual ECDSA authentication via the help of flush+reload side channel attacks in FortiGate VM models only.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-19-186 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-19-186 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-19-186 - Vendor Advisory |
Information
Published : 2019-10-24 14:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15703
Mitre link : CVE-2019-15703
CVE.ORG link : CVE-2019-15703
JSON object : View
Products Affected
fortinet
- fortios
CWE
CWE-331
Insufficient Entropy