PSIRT Advisories
The following is a list of advisories for issues resolved in Fortinet products. The resolution of such issues is coordinated by the Fortinet Product Security Incident Response Team (PSIRT), a dedicated, global team that manages the receipt, investigation, and public reporting of information about security vulnerabilities and issues related to Fortinet products and services.
For details of how to raise a PSIRT Issue with Fortinet, please see our PSIRT Policy here.
During an upgrade to version 3.4.1, a FortiSwitch device may let an attacker
log in the rest_admin account without a password,...
There is a CSRF vulnerability with FortiWEB console on dashboard. Attackers may submit local forms to change admin password illegally.
A path traversal vulnerability allows an administrator account with read and write privileges to read arbitrary files using the...
FortiOS now includes for all SSL libraries a countermeasure against Lenstra's fault
attack on RSA-CRT optimization when a RSA...
The Security Account Manager Remote Protocol [MS-SAMR] and the Local Security Authority (Domain Policy) Remote Protocol [MS-LSAD] are...
The FortiOS webui accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect....
It is possible to inject malicious script through the DHCP HOSTNAME option.
The malicious script code is injected into the device's...
Since glibc 2.9, the glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library...
An undocumented account used for communication with authorized FortiManager
devices exists on some versions of FortiOS, FortiAnalyzer,...
Researchers discovered that certain next generation firewalls are designed to permit full TCP handshake with any destination,...
OpenSSL released an update in December 2015 to address a small number of vulnerability issues.
The Graphical User Interface (GUI) of FortiManager v5.2.2 is vulnerable to two reflected Cross-Site Scripting (XSS) vulnerabilities.
2...
FortiClient drivers expose IOCTL that may allow an unprivileged user to get system-level privileges.
Installing Forticlient SSLVPN Linux client build 2312 and lower in a home directory that is world readable-executable yields a...
The Web User Interface of FortiSandbox version 2.0.4 and below is vulnerable to multiple reflected Cross-Site Scripting vulnerabilities.
5...