{"id":263274,"date":"2022-03-09T23:04:25","date_gmt":"2022-03-09T22:04:25","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=263274"},"modified":"2022-03-09T23:04:25","modified_gmt":"2022-03-09T22:04:25","slug":"fortinet-vulnerability-advisories-march-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/03\/09\/fortinet-vulnerability-advisories-march-2022\/","title":{"rendered":"Fortinet Vulnerability Advisories March 2022"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\"\/>Der US-Sicherheitsanbieter Fortinet hat bereits Anfang M\u00e4rz 2022 Sicherheitshinweise auf gr\u00f6\u00dfere Schwachstellen in seinem Produkten (Firewalls etc.) ver\u00f6ffentlicht. Blog-Leser Martin H. hatte mich die Tage per Mail \u00fcber diese Sicherheitshinweise informiert. Ich stelle die betreffenden Informationen daher einfach mal unkommentiert im Blog hier ein.<\/p>\n<p><!--more--><\/p>\n<h2>March 2022 Vulnerability Advisories<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/f99aef7f4ffa4247adf9299ca660a685\" width=\"1\" height=\"1\"\/>Hier die Liste der Schwachstellen in den diversen Fortinet-Produkten.<\/p>\n<h3>FortiWLM &#8211; Path traversal vulnerability<\/h3>\n<p>Advisory Summary: Path traversal vulnerability in FortiWLM.<\/p>\n<p>Affected Products: FortiWLM versions 8.6.2 and below. FortiWLM versions 8.5.2 and below. FortiWLM versions 8.4.2 and below. FortiWLM versions 8.3.3 and below.<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-106\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-106<\/a><\/p>\n<p>CVSS Score: 5.3<\/p>\n<h3>FortiManager &#8212; Password observed in cleartext in the config conflict file<\/h3>\n<p>Advisory Summary: Password observed in cleartext in the config conflict file<\/p>\n<p>Affected Products: FortiManager version 6.2.0 through 6.2.9FortiManager version 6.4.0 through 6.4.7FortiManager version 7.0.0 through 7.0.2<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-165\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-165<\/a><\/p>\n<p>CVSS Score: 2.8<\/p>\n<h3>FortiPortal &#8211; Insecure password generation<\/h3>\n<p>Advisory Summary: Weak PRNG in FortiPortal<\/p>\n<p>Affected Products: FortiPortal version 6.0.5 and below. FortiPortal version 5.3.6 and below. FortiPortal version 5.2.6 and below. FortiPortal version 5.1.2 and below. FortiPortal version 5.0.3 and below. FortiPortal version 4.2.4 and below. FortiPortal version 4.1.2 and below. FortiPortal version 4.0.4 and below.<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-099\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-099<\/a><\/p>\n<p>CVSS Score: 7.4<\/p>\n<h3>FortiMail &#8211; Administrative authentication bypass<\/h3>\n<p>Advisory Summary: Improper authentication in FortiMail.<\/p>\n<p>Affected Products: FortiMail version 7.0.0 and below. FortiMail version 6.4.5 and below. FortiMail version 6.2.7 and below. FortiMail version 6.0.11 and below. FortiMail version 5.4.12 and below.<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-028\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-028<\/a><\/p>\n<p>CVSS Score: 9.3<\/p>\n<h3>FortiMail &#8211; Unsafe handling of CGI environment parameters in web server framework<\/h3>\n<p>Advisory Summary: An instance of Improper Input Validation (CWE-20) in the CGI&nbsp; facilities affects FortiMail<\/p>\n<p>Affected Products: FortiMail 7.0.0. FortiMail 6.4.5 and below. FortiMail 6.2.7 and below. FortiMail 6.0.11 and below. FortiMail 5.4.12 and below.<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-008\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-008<\/a><\/p>\n<p>CVSS Score: 7.3<\/p>\n<h3>FortiAP-C &#8211; Command injection in CLI<\/h3>\n<p>Advisory Summary: Command injection vulnerability in FortiAP-C CLI<\/p>\n<p>Affected Products: FortiAP-C version 5.4.0 through 5.4.3<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-227\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-227<\/a><\/p>\n<p>CVSS Score: 7.3<\/p>\n<h3>FortiOS &#8211; Bypassing FortiGate security profiles via SNI in Client Hello<\/h3>\n<p>Advisory Summary: Information disclosure in FortiGate<\/p>\n<p>Affected Products: FortiOS version 6.4.3 and belowFortiOS version 6.2.5 and belowFortiOS version 6.0.11 and below<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-20-091\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-20-091<\/a><\/p>\n<p>CVSS Score: 2.6<\/p>\n<h3>FortiToken Mobile (Android) &#8211; Deny request approved from External push notification<\/h3>\n<p>Advisory Summary:<\/p>\n<p>Improper access control vulnerability in FortiToken Mobile (Android) external push notification<\/p>\n<p>Affected Products: FortiToken Mobile (Android) version 5.1.0 and below.<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-210\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-210<\/a><\/p>\n<p>CVSS Score: 3.9<\/p>\n<h3>FortiAnalyzer, FortiManager &#8211; bypass of client-side password change policy enforcement<\/h3>\n<p>Advisory Summary: Password-change policy bypass in FortiAnalyzer and FortiManager<\/p>\n<p>Affected Products: FortiManager version 5.6.0 through 5.6.11 FortiManager version 6.0.0 through 6.0.11 FortiManager version 6.2.0 through 6.2.9 FortiManager version 6.4.0 through 6.4.7 FortiManager version 7.0.0 through 7.0.2 FortiAnalyzer version 5.6.0 through 5.6.11 FortiAnalyzer version 6.0.0 through 6.0.11 FortiAnalyzer version 6.2.0 through 6.2.9 FortiAnalyzer version 6.4.0 through 6.4.7 FortiAnalyzer version 7.0.0 through 7.0.2<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-255\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-255<\/a><\/p>\n<p>CVSS Score: 3.9<\/p>\n<h3>FortiWLM &#8211; command Injection in script handlers<\/h3>\n<p>Advisory Summary: OS command injection in FortiWLM<\/p>\n<p>Affected Products: FortiWLM version 8.6.2 and below FortiWLM version 8.5.2 and below FortiWLM version 8.4.2 and below<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-128\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-128<\/a><\/p>\n<p>CVSS Score: 8.3<\/p>\n<h3>FortiWLM &#8211; SQL Injection in AP report handlers<\/h3>\n<p>Advisory Summary: SQL injection in FortiWLM<\/p>\n<p>Affected Products: FortiWLM version 8.6.2 and below. FortiWLM version 8.5.2 and below. FortiWLM version 8.4.2 and below. FortiWLM version 8.3.2 and below.<\/p>\n<p>Fortinet Advisory: <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-189\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-189<\/a><\/p>\n<p>CVSS Score: 8.3<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Der US-Sicherheitsanbieter Fortinet hat bereits Anfang M\u00e4rz 2022 Sicherheitshinweise auf gr\u00f6\u00dfere Schwachstellen in seinem Produkten (Firewalls etc.) ver\u00f6ffentlicht. Blog-Leser Martin H. hatte mich die Tage per Mail \u00fcber diese Sicherheitshinweise informiert. Ich stelle die betreffenden Informationen daher einfach mal unkommentiert &hellip; <a href=\"https:\/\/borncity.com\/blog\/2022\/03\/09\/fortinet-vulnerability-advisories-march-2022\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-263274","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/263274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=263274"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/263274\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=263274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=263274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=263274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}