Vulnerabilities > CVE-2015-2323 - Cryptographic Issues vulnerability in Fortinet Fortios

047910
CVSS 6.4 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
NONE
network
low complexity
fortinet
CWE-310
nessus

Summary

FortiOS 5.0.x before 5.0.12 and 5.2.x before 5.2.4 supports anonymous, export, RC4, and possibly other weak ciphers when using TLS to connect to FortiGuard servers, which allows man-in-the-middle attackers to spoof TLS content by modifying packets.

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.

Nessus

NASL familyFirewalls
NASL idFORTIOS_FG-IR-15-021.NASL
descriptionThe remote host is running a version of Fortinet FortiOS that is 5.0.x prior to 5.0.12 or 5.2.x prior 5.2.4. It is, therefore, affected by a flaw when connecting to a FortiGuard server via TLS due to the support of weak ciphers such as anonymous, export, and RC4. A man-in-the-middle attacker can exploit this to downgrade the TLS cipher suite and conduct attacks on the TLS connection.
last seen2020-06-01
modified2020-06-02
plugin id85911
published2015-09-11
reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/85911
titleFortinet FortiOS 5.0.x < 5.0.12 / 5.2.x < 5.2.4 Weak Ciphers (FG-IR-15-021)