<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Vulnerability in OpenSSL library</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-22-059</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2022-04-01T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2022-04-01T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2022-04-01T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            A security advisory was released affecting the version of OpenSSL library used in some Fortinet products:CVE-2022-0778:The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.Thus vulnerable situations include:TLS clients consuming server certificatesTLS servers consuming client certificatesHosting providers taking certificates or private keys from customersCertificate authorities parsing certification requests from subscribersAnything else which parses ASN.1 elliptic curve parametersAlso any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue.In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature.This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022.Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Denial of service
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiOS version 6.0.0 through 6.0.14FortiOS version 6.2.0 through 6.2.10FortiOS version 6.4.0 through 6.4.8FortiOS version 7.0.0 through 7.0.5FortiManager version 6.2.0 through 6.2.9FortiManager version 6.4.0 through 6.4.7FortiManager version 7.0.0 through 7.0.3FortiAnalyzer version 6.2.0 through 6.2.9FortiAnalyzer version 6.4.0 through 6.4.7FortiAnalyzer version 7.0.0 through 7.0.3FortiDeceptor version 3.x all versionsFortiDeceptor version 4.0 all versionsFortiDeceptor version 4.1.0FortiAuthenticator version 6.0 all versionsFortiAuthenticator version 6.1 all versionsFortiAuthenticator version 6.2 all versionsFortiAuthenticator version 6.3 all versionsFortiAuthenticator version 6.4.0 through 6.4.1FortiMail version 6.0 all versionsFortiMail version 6.2.0 through 6.2.8FortiMail version 6.4.0 through 6.4.6FortiMail version 7.0.0 through 7.0.3FortiRecorder version 6.0.0 through 6.0.10FortiRecorder version 6.4.0 through 6.4.2FortiProxy version 7.0.0 through 7.0.3FortiSwitch version 6.0 all versionsFortiSwitch version 6.2 all versionsFortiSwitch version 6.4.0 through 6.4.10FortiSwitch version 7.0.0 through 7.0.4FortiWeb version 6.3.0 through 6.3.18FortiWeb version 6.4.0 through 6.4.2FortiWeb version 7.0.0FortiADCManager version 5.x all versionsFortiADCManager version 6.x all versionsFortiSIEM version 5.0 all versionsFortiSIEM version 6.1 all versionsFortiSIEM version 6.2 all versionsFortiSIEM version 6.3 all versionsFortiSIEM version 6.4.0FortiVoiceEnterprise version 6.0.0 through 6.0.11FortiVoiceEnterprise version 6.4.0 through 6.4.4FortiNDR version 1.x all versionsFortiClientWindows version 6.2 all versionsFortiClientWindows version 6.4.0 through 6.4.8FortiClientWindows version 7.0.0 through 7.0.3FortiClientEMS version 6.2 all versionsFortiClientEMS version 6.4.0 through 6.4.7FortiClientEMS version 7.0.0 through 7.0.3FortiADC version 6.0 all versionsFortiADC version 6.1 all versionsFortiADC version 6.2.0 through 6.2.3FortiADC version 7.0.0 through 7.0.1FortiTester 7.1.0 and belowFortiAIOps 1.0.xFortiAP version 7.2.0FortiAP version 7.0 all versionsFortiAP version 6.4 all versionsFortiAP version 6.0 all versionsFortiAP-W2 version 7.2.0FortiAP-W2 version 7.0 all versionsFortiAP-W2 version 6.4 all versionsFortiClientMac version 7.0.0 through 7.0.5FortiClientMac version 6.4.0 through 6.4.8FortiClientMac version 6.2 all versionsFortiClientLinux version 7.0.0 through 7.0.5FortiClientLinux version 6.4 all versionsFortiClientLinux version 6.2 all versionsFortiClientiOS version 6.0 all versionsFortiClientiOS version 5.0 all versionsFortiDDoS-F version 6.3.0 through 6.3.3FortiDDoS-F version 6.2.0 through 6.2.2FortiDDoS-F version 6.1.0 through 6.1.4FortiClientAndroid version 6.0 all versionsFortiClientAndroid version 5.0 all versionsFortiIsolator version 2.4.0FortiIsolator version 2.3.0 through 2.3.4FortiIsolator version 2.2 all versionsFortiIsolator version 2.1 all versionsFortiIsolator version 2.0 all versionsFortiWAN version 4.5.0 through 4.5.9FortiWAN version 4.4 all versionsFortiWAN version 4.3 all versionsFortiDDoS 5.6 all versionsFortiDDoS 5.5 all versionsFortiDDoS 5.4 all versionsFortiDDoS 5.3 all versionsFortiDDoS 5.2 all versionsFortiDDoS 5.1 all versionsFortiDDoS 5.0 all versionsFortiDDoS 4.7 all versionsFortiDDoS 4.6 all versionsFortiDDoS 4.5 all versionsFortiDDoS 4.4 all versionsThe Following Products are not impacted:FortiSandboxThe following products are under investigation:FortiAP-SFortiAP-UFortiConnectFortiEdgeFortiPentestFortiWLMFortiWLC
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Please upgrade to FortiOS version 6.0.15 or above.Please upgrade to FortiOS version 6.2.11 or above.Please upgrade to FortiOS version 6.4.9 or above.Please upgrade to FortiOS version 7.0.6 or above.Please upgrade to FortiOS version 7.2.0 or above.Please upgrade to FortiManager version 6.4.8 or above.Please upgrade to FortiManager version 7.0.4 or above.Please upgrade to FortiManager version 7.2.0 or above.Please upgrade to FortiAnalyzer version 6.4.8 or abovePlease upgrade to FortiAnalyzer version 7.0.4 or abovePlease upgrade to FortiAnalyzer version 7.2.0 or abovePlease upgrade to FortiAuthenticator version 6.4.2 or abovePlease upgrade to FortiAuthenticator version 6.5.0 or abovePlease upgrade to FortiDeceptor version 4.2.0 or abovePlease upgrade to FortiMail version 7.2.0 or abovePlease upgrade to FortiMail version 7.0.4 or abovePlease upgrade to FortiMail version 6.4.7 or abovePlease upgrade to FortiMail version 6.2.9 or abovePlease upgrade to FortiRecorder version 7.0.0 or abovePlease upgrade to FortiRecorder version 6.4.3 or abovePlease upgrade to FortiRecorder version 6.0.11 or abovePlease upgrade to FortiProxy version 7.0.4 or abovePlease upgrade to FortiWeb version 7.0.1 or abovePlease upgrade to FortiWeb version 6.4.3 or abovePlease upgrade to FortiWeb version 6.3.19 or abovePlease upgrade to FortiSwitch version 7.2.0 or abovePlease upgrade to FortiSwitch version 7.0.5 or abovePlease upgrade to FortiSwitch version 6.4.11 or abovePlease upgrade to FortiADCManager version 7.0.0 or abovePlease upgrade to FortiSIEM 6.5.0 or abovePlease upgrade to FortiNDR 7.0.0 or abovePlease upgrade to FortiVoiceEnterprise 6.4.5 or abovePlease upgrade to FortiVoiceEnterprise 6.0.12 or abovePlease upgrade to FortiClientWindows 7.0.4 or abovePlease upgrade to FortiClientWindows 6.4.9 or abovePlease upgrade to FortiClientEMS 7.0.4 or abovePlease upgrade to FortiClientEMS 6.4.8 or abovePlease upgrade to FortiADC 7.1.0 or abovePlease upgrade to FortiADC 7.0.2 or abovePlease upgrade to FortiADC 6.2.4 or abovePlease upgrade to FortiTester 7.2.0 or abovePlease upgrade to FortiAIOps 1.1.0 or abovePlease upgrade to FortiPortal 7.0.0 or abovePlease upgrade to FortiAP version 7.2.1 or abovePlease upgrade to FortiAP-W2 version 7.2.1 or abovePlease upgrade to FortiClientMac version 7.0.6 or abovePlease upgrade to FortiClientMac version 6.4.9 or abovePlease upgrade to FortiClientLinux version 7.0.6 or abovePlease upgrade to FortiClientiOS version 7.0.3 or abovePlease upgrade to FortiClientAndroid version 7.0.3 or abovePlease upgrade to FortiIsolator 2.4.1 or abovePlease upgrade to FortiIsolator 2.3.5 or abovePlease upgrade to FortiWAN version 4.5.10 or abovePlease upgrade to FortiDDoS-F version 6.4.0 or abovePlease upgrade to FortiDDoS version 5.7.0 or aboveProtection with IPS signature:Upgrade to IPS definitions version 20.292 or above, and make sure the action for signature 51345 is set to block.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-22-059</cvrf:URL>
            <cvrf:Description>Vulnerability in OpenSSL library</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-0778</cvrf:URL>
            <cvrf:Description>https://nvd.nist.gov/vuln/detail/CVE-2022-0778</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://www.openssl.org/news/secadv/20220315.txt</cvrf:URL>
            <cvrf:Description>https://www.openssl.org/news/secadv/20220315.txt</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://www.fortiguard.com/encyclopedia/ips/51345</cvrf:URL>
            <cvrf:Description>https://www.fortiguard.com/encyclopedia/ips/51345</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <Vulnerability Ordinal="1">
        <Title>Vulnerability in OpenSSL library</Title>
        <cvrf:CVE>CVE-2022-0778</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>7.5</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-22-059</URL>
                <Description>Vulnerability in OpenSSL library</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://nvd.nist.gov/vuln/detail/CVE-2022-0778</URL>
                <Description>https://nvd.nist.gov/vuln/detail/CVE-2022-0778</Description>
            </Reference>
            <Reference>
                <URL>https://www.openssl.org/news/secadv/20220315.txt</URL>
                <Description>https://www.openssl.org/news/secadv/20220315.txt</Description>
            </Reference>
            <Reference>
                <URL>https://www.fortiguard.com/encyclopedia/ips/51345</URL>
                <Description>https://www.fortiguard.com/encyclopedia/ips/51345</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>