<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>CVE-2014-8730 &#34;Poodle for TLS&#34; vulnerability</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-14-034</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2014-12-18T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2014-12-18T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2014-12-18T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Impact" Type="General" Ordinal="1">
            Information disclosure
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="2">
            FortiOS 5.2.2, 5.2.1, 5.2.0, 5.0.10 and lower running on a hardware appliance when all the following conditions are met:FortiGate models with accelerated CP processorsThe SSL connection is using TLS v1.0, v1.1 or v1.2The SSL ciphers are CBCOnly the following features are affected: virtual server with SSL, SSL offload, explicit-proxy SSL,transparent-proxy SSL, web-cache SSL, Wan Opt SSL and SIP SSLAll versions of Fortigate VM, FortiOS 5.4 branch, FortiOS 5.6 branch and next releases are not vulnerable.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="3">
            FortiOS 5.0 branch users must upgrade to 5.0.11 or higher.FortiOS 5.2.0 branch customers must upgrade to 5.2.3 or higher.The customers running FortiOS 5.2.2, 5.2.1, 5.2.0, 5.0.10 and lower under all conditions met as per the affected product section can apply the following workaround: config system globalset virtual-server-hardware-acceleration disableendNote: The performance impact may be significant.To protect devices with a FortiGate, the following IPS signature blocks any attack attempt and is available since IPS update 5.587: TLS.Padding.Oracle.Information.Disclosure
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-14-034</cvrf:URL>
            <cvrf:Description>CVE-2014-8730 &#34;Poodle for TLS&#34; vulnerability</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://www.imperialviolet.org/2014/12/08/poodleagain.html</cvrf:URL>
            <cvrf:Description>https://www.imperialviolet.org/2014/12/08/poodleagain.html</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <Vulnerability Ordinal="1">
        <Title>CVE-2014-8730 &#34;Poodle for TLS&#34; vulnerability</Title>
        <cvrf:CVE>CVE-2014-8730</cvrf:CVE>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-14-034</URL>
                <Description>CVE-2014-8730 &#34;Poodle for TLS&#34; vulnerability</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://www.imperialviolet.org/2014/12/08/poodleagain.html</URL>
                <Description>https://www.imperialviolet.org/2014/12/08/poodleagain.html</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>