<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>TCP timestamp response - RFC1323</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-16-090</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2019-07-24T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2019-07-24T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2019-07-24T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            FortiOS by default enables TCP timestamp response, which may lead to information disclosure. The TCP timestamp response can be used to approximate the FortiOS device uptime, potentially aiding in further attacks. This may be used by an attacker to estimate if FortiOS has not been upgraded to the latest version, because upgrading resets the device&#39;s uptime.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Information disclosure
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiOS all versions, when TCP timestamp is enabled (default setting)
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            FortiOS supports admin CLI console commands to disable the TCP timestamp: config system global set tcp-option disable / enable is the default value / end Disabling tcp-option will strip TCP header Timestamp, Selective Acknowledgements (SACK) and Window Scaling altogether which can lead performance penalty for services hosted on FortiOS under certain network environment. For details about the tcp-option, please refer to the Fortinet knowledge base: https://kb.fortinet.com/kb/documentLink.do?externalID=FD44724
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <Vulnerability Ordinal="1">
        <Title>TCP timestamp response - RFC1323</Title>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>5.2</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-16-090</URL>
                <Description>TCP timestamp response - RFC1323</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>