<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Zombie POODLE and GOLDENDOODLE - Two new exploits found for TLS 1.2</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-145</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2020-02-25T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2020-02-25T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2020-02-25T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Multiple padding Oracle vulnerabilities (Zombie POODLE, GOLDENDOODLE, OpenSSL 0-length) in the CBC padding implementation of FortiOS when configured with SSL Deep Inspection policies and with the IPS sensor enabled may allow an attacker to decipher TLS connections going through the FortiGate by monitoring the traffic (should he/she be able to).
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Information disclosure
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiOS when using the following IPS Engine versions:IPS Engine version 5.00000 to 5.00006IPS Engine version 4.00000 to 4.00036IPS Engine version 4.00200 to 4.00219IPS Engine version 3.00547 and below
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Update to IPS engine 3.00548, 4.00037, 5.00007 or above.Specifically: IPS Engine 3.00548 (or above) for the FortiOS 5.6 branch and branches below IPS Engine 4.00037 (or above) for the ForitOS 6.0 branch IPS Engine 5.00007 (or above) for the FortiOS 6.2 branchAn IPS Engine that includes the fix is built-in FortiOS 5.6.11, 6.0.9 and 6.2.1, and versions above in those respective branches.To check for the FortiOS IPS engine version:From the admin CLI console: run command&#34;diag autoupdate versions&#34; IPS Attack Engine Version: x.xxxxxFrom the admin webUI: System-&gt;FortiGuard-&gt;IPS Engine-&gt;Version x.xxxxxFor the IPS engine and FortiOS version compatibility chart, please refer the following link:https://pub.kb.fortinet.com/ksmcontent/Fortinet-Public/current/FortiGate_6_0/fortios-fortiaps-ips-av-compatibility.pdfRevision History:07-23-2019 Initial version02-25-2020 Added FortiOS versions with built-in IPS Engines.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <Vulnerability Ordinal="1">
        <Title>Zombie POODLE and GOLDENDOODLE - Two new exploits found for TLS 1.2</Title>
        <cvrf:CVE>CVE-2019-5592</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>4.9</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-145</URL>
                <Description>Zombie POODLE and GOLDENDOODLE - Two new exploits found for TLS 1.2</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>