Vulnerabilities > CVE-2015-2323 - Cryptographic Issues vulnerability in Fortinet Fortios

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

FortiOS 5.0.x before 5.0.12 and 5.2.x before 5.2.4 supports anonymous, export, RC4, and possibly other weak ciphers when using TLS to connect to FortiGuard servers, which allows man-in-the-middle attackers to spoof TLS content by modifying packets.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

NASL familyFirewalls
NASL idFORTIOS_FG-IR-15-021.NASL
descriptionThe remote host is running a version of Fortinet FortiOS that is 5.0.x prior to 5.0.12 or 5.2.x prior 5.2.4. It is, therefore, affected by a flaw when connecting to a FortiGuard server via TLS due to the support of weak ciphers such as anonymous, export, and RC4. A man-in-the-middle attacker can exploit this to downgrade the TLS cipher suite and conduct attacks on the TLS connection.
last seen2020-06-01
modified2020-06-02
plugin id85911
published2015-09-11
reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/85911
titleFortinet FortiOS 5.0.x < 5.0.12 / 5.2.x < 5.2.4 Weak Ciphers (FG-IR-15-021)