Описание
The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.3.18 (включая)
Одно из
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.16:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:4.3.17:*:*:*:*:*:*:*
EPSS
Процентиль: 59%
0.00379
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
CVSS3: 5.9
github
больше 3 лет назад
The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
EPSS
Процентиль: 59%
0.00379
Низкий
5.9 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-200