<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>FortiSwitch rest_admin account exposed under specific conditions</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-16-011</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2016-07-11T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2016-07-11T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2016-07-11T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            During an upgrade to version 3.4.1, a FortiSwitch device may let an attacker log in the rest_admin account without a password, if all the conditions below are met: Ã‚Â * The FortiSwitch device is in FortiLink managed mode (not the default mode) * The FortiSwitch device does not have a management FortiGate, or is not authorized on its management FortiGate, or cannot reach its management FortiGate (network connectivity issue) * The FortiSwicth device was updated to 3.4.1 * The FortiSwitch device was rebooted at least a second time after having been upgradedÃ‚Â Note that as soon as a connection between the FortiSwitch and its management FortiGate is established/authorized, the issue is not present. Ã‚Â Note that the issue persists if the device is downgraded after having been upgraded to 3.4.1 (under the conditions above).
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Remote administrative access
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            The following FortiSwitch models may be affected, after an upgrade to 3.4.1: Ã‚Â FSW-108D-POE,FSW-124D,FSW-124D-POE FSW-224D-POE,FSW-224D-FPOE,FSW-248D-POE,FSW-248D-FPOE FSW-424D,FSW-424D-POE,FSW-424D-FPOE,FSW-448D,FSW-448D-POE,FSW-448D-FPOE FSW-524D,FSW-524D-FPOE,FSW-548D,FSW-548D-FPOE FSW-1024D,FSW-1048D FSW-3032D FSW-R-112D-POE
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            * FortiSwitch 3.4.1 must be upgraded to 3.4.2. Ã‚Â Note: For Customers that have no formal support contract and require access to updated firmware, please contact Customer Services at cs@fortinet.com in the first instance.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-16-011</cvrf:URL>
            <cvrf:Description>FortiSwitch rest_admin account exposed under specific conditions</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://www.themissinglink.com.au/security/advisories/cve-2016-4573</cvrf:URL>
            <cvrf:Description>https://www.themissinglink.com.au/security/advisories/cve-2016-4573</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thanks Emma Ferguson of The Missing Link Security for reporting a FortiSwitch vulnerability under</cvrf:Description>
        </cvrf:Acknowledgment>
        <cvrf:Acknowledgment>
            <cvrf:Description>responsible disclosure.</cvrf:Description>
        </cvrf:Acknowledgment>
        <cvrf:Acknowledgment>
            <cvrf:Description></cvrf:Description>
        </cvrf:Acknowledgment>
        <cvrf:Acknowledgment>
            <cvrf:Description></cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>FortiSwitch rest_admin account exposed under specific conditions</Title>
        <cvrf:CVE>CVE-2016-4573</cvrf:CVE>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-16-011</URL>
                <Description>FortiSwitch rest_admin account exposed under specific conditions</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://www.themissinglink.com.au/security/advisories/cve-2016-4573</URL>
                <Description>https://www.themissinglink.com.au/security/advisories/cve-2016-4573</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>