<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Use of hardcoded key for the JWT token</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-22-071</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2022-06-07T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2022-06-07T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2022-06-07T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiDDoS API may allow an attacker who managed to retrieve the key from one device to sign JWT tokens for any device.
        </cvrf:Note>
        <cvrf:Note Title="Description" Type="General" Ordinal="2">
            None
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="3">
            Improper access control
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="4">
            FortiDDoS 5.6 all versions are not affectedFortiDDoS 5.5 all versionsFortiDDoS version 5.4.0 through 5.4.2FortiDDoS version 5.3.0 through 5.3.1FortiDDoS 5.2 all versionsFortiDDoS 5.1 all versionsFortiDDoS 5.0 all versions are not affectedFortiDDoS 4.7 all versions are not affectedFortiDDoS 4.6 all versions are not affectedFortiDDoS 4.5 all versions are not affected
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="5">
            Please upgrade to upcoming FortoDDoS 5.6.0 or above.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Victor Pasman for bringing this issue to our attention under responsible disclosure.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <ProductTree>
        <Branch Name="Fortinet" Type="Vendor">
            <Branch Name="FortiDDoS" Type="Product Name">
                <Branch Name="5.5.2" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.5.2">FortiDDoS 5.5.2</FullProductName>
                </Branch>
                <Branch Name="5.5.1" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.5.1">FortiDDoS 5.5.1</FullProductName>
                </Branch>
                <Branch Name="5.5.0" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.5.0">FortiDDoS 5.5.0</FullProductName>
                </Branch>
                <Branch Name="5.4.2" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.4.2">FortiDDoS 5.4.2</FullProductName>
                </Branch>
                <Branch Name="5.4.1" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.4.1">FortiDDoS 5.4.1</FullProductName>
                </Branch>
                <Branch Name="5.4.0" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.4.0">FortiDDoS 5.4.0</FullProductName>
                </Branch>
                <Branch Name="5.3.1" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.3.1">FortiDDoS 5.3.1</FullProductName>
                </Branch>
                <Branch Name="5.3.0" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.3.0">FortiDDoS 5.3.0</FullProductName>
                </Branch>
                <Branch Name="5.2.0" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.2.0">FortiDDoS 5.2.0</FullProductName>
                </Branch>
                <Branch Name="5.1.0" Type="Product Version">
                    <FullProductName ProductID="FortiDDoS-5.1.0">FortiDDoS 5.1.0</FullProductName>
                </Branch>
            </Branch>
        </Branch>
    </ProductTree>
    <Vulnerability Ordinal="1">
        <Title>Use of hardcoded key for the JWT token</Title>
        <cvrf:CVE>CVE-2022-29060</cvrf:CVE>
        <ProductStatuses>
            <Status Type="Known Affected">
                <ProductID>FortiDDoS-5.5.2</ProductID>
                <ProductID>FortiDDoS-5.5.1</ProductID>
                <ProductID>FortiDDoS-5.5.0</ProductID>
                <ProductID>FortiDDoS-5.4.2</ProductID>
                <ProductID>FortiDDoS-5.4.1</ProductID>
                <ProductID>FortiDDoS-5.4.0</ProductID>
                <ProductID>FortiDDoS-5.3.1</ProductID>
                <ProductID>FortiDDoS-5.3.0</ProductID>
                <ProductID>FortiDDoS-5.2.0</ProductID>
                <ProductID>FortiDDoS-5.1.0</ProductID>
            </Status>
        </ProductStatuses>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>7.8</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-22-071</URL>
                <Description>Use of hardcoded key for the JWT token</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>