Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2p93-h9hw-wqjg

Опубликовано: 17 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

EPSS

Процентиль: 34%
0.00136
Низкий

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 8.2
nvd
около 4 лет назад

A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.

CVSS3: 8.2
fstec
около 4 лет назад

Уязвимость сервера для управления программами Fortinet FortiClient Enterprise Management Server (EMS), связанная с ошибками подтверждения подлинности сертификата, позволяющая нарушителю провести атаки типа «человек посередине» и раскрыть защищаемую информацию

EPSS

Процентиль: 34%
0.00136
Низкий

Дефекты

CWE-798