<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>[FortiSiem] Hardcoded ssh credentials allow access to Supervisor as tunneluser</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-296</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2020-01-15T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2020-01-15T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2020-01-15T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            A use of hard-coded cryptographic key vulnerability in FortiSIEM may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user &#34;tunneluser&#34; by leveraging knowledge of the private key from another installation or a firmware image.Note: Restricted user &#34;tunneluser&#34; runs in a restricted shell that lets only that user create tunnel connections from the supervisor to the originating IP (i.e. enabling reverse-shell connections to the IP that initiated the connection). This is a feature that exists to enable connecting to collectors from the supervisor when there is a firewall between the collector and the supervisor.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Improper access control
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiSIEM version 5.2.6 and below.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. Workaround (for FortiSIEM version 5.2.6 and lower): Customers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999 by following the steps below :1. SSH to the Supervisor node as the root user.2. Remove tunneluser SSH configuration file to disable listening on port 19999:rm -f /etc/ssh/sshd_config.tunneluserecho rm -f /etc/ssh/sshd_config.tunneluser &gt;&gt; /etc/init.d/phProvision.sh3. Then terminate sshd running on TCP Port 19999 as follows:pkill -f /usr/sbin/sshd -p 199994.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account:rm -f /opt/phoenix/deployment/id_rsa.pub.tunneluserrm -f /home/tunneluser/.ssh/authorized_keysrm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsaCustomers are also advised to disable &#34;tunneluser&#34; SSH access on port 22 by following the steps bwlow:1. SSH to the Supervisor node as the root user.2. Add/edit the following line in sshd_config file: echo DenyUsers tunneluser &gt;&gt; /etc/ssh/sshd_config3. service sshd restart
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Andrew Klaus for bringing this issue to our attention.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>[FortiSiem] Hardcoded ssh credentials allow access to Supervisor as tunneluser</Title>
        <cvrf:CVE>CVE-2019-17659</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>3.6</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-296</URL>
                <Description>[FortiSiem] Hardcoded ssh credentials allow access to Supervisor as tunneluser</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>