<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>[FortiOS] SSL VPN account hijack (unauthorized modification of users passwords)</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-18-389</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2019-08-30T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2019-08-30T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2019-08-30T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            An Improper Authorization vulnerability in the SSL VPN web portal may allow an unauthenticated attacker to change the password of locally authenticated SSL VPN web portal users via specially crafted HTTP requests.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Improper access control
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiOS 6.0.0 to 6.0.4 FortiOS 5.6.0 to 5.6.8 FortiOS 5.4.1 to 5.4.10only if the SSL VPN service (web-mode or tunnel-mode) is enabled and users with local authentication are affected (SSL VPN users with remote authentication (LDAP or RADIUS) are not impacted).Versions 5.4.0 and below (including branch 5.2) are not affected.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Upgrade to FortiOS 5.4.11, 5.6.9, 6.0.5, 6.2.0 or above.Mitigation:SSL VPN users with local authentication can mitigate the impact by enabling Two-Factor Authentication (2FA): If their password is changed by an attacker leveraging this vulnerability, the attacker will not be able to log in and use their SSL VPN account.Workaround:The only workaround is to migrate SSL VPN user authentication from local to remote (LDAP or RADIUS), or totally disable the SSL-VPN service (both web-mode and tunnel-mode) by applying the following CLI commands:config vpn ssl settingsunset source-interfaceendNote that firewall policies tied to SSL VPN will need to be unset first for the above sequence to execute successfully.As an example, when source-interface is &#34;port1&#34; and SSL VPN interface is &#34;ssl.root&#34;, the following CLI commands would be needed to ensure &#34;unset source-interface&#34; executes successfully:config vpn ssl settings config authentication-rulepurge (purge all authentication-rules)endendconfig firewall policy delete [policy-id] (SSL VPN policy ID(s) that srcintf is &#34;ssl.root&#34; and dstintf is &#34;port1&#34;)endRevision History:2019-05-24 Initial version2019-06-04 Clarified the affected versions and workarounds.2019-08-30 Add two-factor authentication (2FA) mitigation.2019-08-30 Add public disclosure reference link.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-18-389</cvrf:URL>
            <cvrf:Description>[FortiOS] SSL VPN account hijack (unauthorized modification of users passwords)</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</cvrf:URL>
            <cvrf:Description>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Meh Chang and Orange Tsai from DEVCORE Security Research Team for reporting this vulnerability under responsible disclosure.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>[FortiOS] SSL VPN account hijack (unauthorized modification of users passwords)</Title>
        <cvrf:CVE>CVE-2018-13382</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>8.9</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-18-389</URL>
                <Description>[FortiOS] SSL VPN account hijack (unauthorized modification of users passwords)</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</URL>
                <Description>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>