<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Dragonblood vulnerabilities disclosed in WiFi WPA3 standard</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-107</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2020-01-03T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2020-01-03T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2020-01-03T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Multiple vulnerabilities, referred to as Dragonblood, exist in WiFi WPA3 standard implementation .Dragonblood vulnerabilities impacting WiFi WPA3 standard implementations can cause password leak, denial of service or authorization bypass. They consist it:CVE-2019-9494: SAE cache attack against ECC groups (SAE side-channel attacks)CVE-2019-9495: EAP-PWD cache attack against ECC groups (EAP-PWD side-channel attack)CVE-2019-9496: SAE confirm missing state validationCVE-2019-9497: EAP-PWD reflection attack (EAP-PWD missing commit validation)CVE-2019-9498: EAP-PWD server missing commit validation for scalar/elementCVE-2019-9499: EAP-PWD peer missing commit validation for scalar/element
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Information disclosure
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiOS and FortiAP-S/W2 are only impacted by:CVE-2019-9494CVE-2019-9495CVE-2019-9496Meru AP and Meru Controller are only impacted by:CVE-2019-9496
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            FortiOS:CVE-2019-9494 upgrade to FortiOS 6.2.2CVE-2019-9495 upgrade to FortiOS 6.2.2CVE-2019-9496 upgrade to FortiOS 6.2.3FortiAP-S/W2:CVE-2019-9494 upgrade to FortiAP-S/W2 6.2.1CVE-2019-9495 upgrade to FortiAP-S/W2 6.2.1CVE-2019-9496 upgrade to FortiAP-S/W2 6.2.2Meru AP:CVE-2019-9496 upgrade to Meru AP 8.5.1Meru Controller:CVE-2019-9496 upgrade to Meru Controller 8.5.1
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-107</cvrf:URL>
            <cvrf:Description>Dragonblood vulnerabilities disclosed in WiFi WPA3 standard</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://kb.cert.org/vuls/id/871675/</cvrf:URL>
            <cvrf:Description>https://kb.cert.org/vuls/id/871675/</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <Vulnerability Ordinal="1">
        <Title>Dragonblood vulnerabilities disclosed in WiFi WPA3 standard</Title>
        <cvrf:CVE>CVE-2019-9494</cvrf:CVE>
        <cvrf:CVE>CVE-2019-9496</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>5.3</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-107</URL>
                <Description>Dragonblood vulnerabilities disclosed in WiFi WPA3 standard</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://kb.cert.org/vuls/id/871675/</URL>
                <Description>https://kb.cert.org/vuls/id/871675/</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>