PSIRT Advisories

The FortiGuard Labs Product Security Incident Response Team (PSIRT) continually test Fortinet hardware and software products, looking for vulnerabilities and weaknesses. Any such findings are fed back to Fortinet's development teams and serious issues are described along with protective solutions in the advisories below.

There is a CSRF vulnerability with FortiWEB console on dashboard. Attackers may submit local forms to change admin password illegally....

Jun 23, 2016 Risk IR Number: FG-IR-16-010
A path traversal vulnerability allows an administrator account with read and write privileges to read arbitrary files using the...

May 26, 2016 Risk IR Number: FG-IR-16-009
FortiOS now includes for all SSL libraries a countermeasure against Lenstra's fault attack on RSA-CRT optimization when a RSA...

May 16, 2016 Risk IR Number: FG-IR-16-008
The Security Account Manager Remote Protocol [MS-SAMR] and theLocal Security Authority (Domain Policy) Remote Protocol [MS-LSAD]are...

Apr 14, 2016 Risk IR Number: FG-IR-16-007
The FortiOS webui accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect....

Mar 16, 2016 Risk IR Number: FG-IR-16-004
It is possible to inject malicious script through the DHCP HOSTNAME option. The malicious script code is injected into the device's...

Mar 16, 2016 Risk IR Number: FG-IR-16-003
Since glibc 2.9, the glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library...

Feb 25, 2016 Risk IR Number: FG-IR-16-002
An undocumented account used for communication with authorized FortiManager devices exists on some versions of FortiOS, FortiAnalyzer,...

Jan 12, 2016 Risk IR Number: FG-IR-16-001
Researchers discovered that certain next generation firewalls are designed to permit full TCP handshake with any destination,...

Dec 15, 2015 Risk IR Number: FG-IR-15-024
OpenSSL released an update in December 2015 to address a small number of vulnerability issues.

Dec 10, 2015 Risk IR Number: FG-IR-15-023
The Graphical User Interface (GUI) of FortiManager v5.2.2 is vulnerable to two reflected Cross-Site Scripting (XSS) vulnerabilities. 2...

Sep 24, 2015 Risk IR Number: FG-IR-15-022
FortiClient drivers expose IOCTL that may allow an unprivileged user to get system-level privileges.

Sep 01, 2015 Risk IR Number: FG-IR-15-025
The Web User Interface of FortiSandbox version 2.0.4 and below is vulnerable to multiple reflected Cross-Site Scripting vulnerabilities. 5...

Jul 24, 2015 Risk IR Number: FG-IR-15-019
Installing Forticlient SSLVPN Linux client build 2312 and lower in a home directory that is world readable-executable yields a...

Jul 24, 2015 Risk IR Number: FG-IR-15-017
A remote attacker may access the internal ZebOS shell of FortiOS 5.2.3 without authentication on the HA ("High Availability")...

Jul 24, 2015 Risk IR Number: FG-IR-15-020