<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Multiple cryptographic flaws allow for full LDAP and RADIUS passwords compromise</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-20-222</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2021-12-07T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2021-12-07T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2021-12-07T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            A missing cryptographic steps vulnerability [CWE-325] in the function that encrypts users LDAP and RADIUS credentials in FortiDDoS-F, FortiDDoS, FortiSandbox, FortiWeb, FortiADC, and FortiMail may allow an attacker in possession of the password store to compromise the confidentiality of the encrypted secrets.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiDDoS-F version 6.3.0FortiDDoS-F version 6.2.0 through 6.2.2FortiDDoS-F version 6.1.0 through 6.1.4At leastFortiDDoS 5.5 all versionsFortiDDoS 5.4 all versionsFortiDDoS 5.3 all versionsFortiDDoS 5.2 all versionsFortiDDoS 5.1 all versionsFortiDDoS 5.0 all versionsFortiDDoS 4.7 all versionsFortiDDoS 4.6 all versionsFortiDDoS 4.5 all versionsFortiDDoS 4.4 all versionsFortiSandbox 4.0.0FortiSandbox 3.2.2 and below.FortiWeb versions 6.3.11 and below.FortiWeb versions 6.2.4 and below.FortiWeb versions 6.1.2 and below.FortiWeb versions 6.0.7 and below.FortiWeb versions 5.9.1 and below.FortiWeb versions 5.8.7 and below.FortiWeb versions 5.7.3 and below.FortiADC versions 6.2.1 and below.FortiADC versions 6.1.3 and below.FortiADC versions 6.0.3 and below.All FortiADC versions 5.x.FortiMail versions 7.0.1 and below.FortiMail versions 6.4.5 and below.FortiMail versions 6.2.7 and below.FortiMail versions 6.0.11 and below.All FortiMail versions 5.x.Note: FortiMail is only impacted when the mail data migration feature is enabled, in server mode (disabled by default). Gateway mode and transparent mode are not affected.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Please upgrade to FortiDDoS-F version 6.3.1 or abovePlease upgrade to FortiDDoS-F version 6.2.3 or abovePlease upgrade to FortiDDoS-F version 6.1.5 or abovePlease upgrade to FortiDDoS version 5.7.0 or aboveUpgrade to FortiSandbox version 4.0.1 or above.Upgrade to FortiSandbox version 3.2.3 or above.Upgrade to FortiWeb version 6.3.12 or above.Upgrade to FortiWeb version 6.2.5 or above.Upgrade to FortiADC version 6.2.1 or above.Upgrade to FortiADC version 6.1.4 or above.*** Fix for FortiMail to be confirmed. ***FortiMail workaround: Disable the data migration feature, if in server mode (other modes are not impacted)
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Internally discovered and reported by Giuseppe Cocomazzi of Fortinet Product Security team.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>Multiple cryptographic flaws allow for full LDAP and RADIUS passwords compromise</Title>
        <cvrf:CVE>CVE-2021-32591</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>5.3</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:X/RC:C</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-20-222</URL>
                <Description>Multiple cryptographic flaws allow for full LDAP and RADIUS passwords compromise</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>