Operating System:

[Appliance]

Published:

28 September 2021

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.2230.2
             FortiOS SSL VPN user credential plaintext storage
                             28 September 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           FortiOS
Publisher:         Fortiguard
Operating System:  Network Appliance
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17655  

Reference:         ESB-2020.0320

Original Bulletin: 
   https://fortiguard.com/psirt/FG-IR-19-217

Revision History:  September 28 2021: Vendor updated Affected Products and Solution details
                   June      29 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

FortiOS SSL VPN user credential plaintext storage

IR Number        : FG-IR-19-217
Date             : Sep 7, 2021
Risk             : 3/5
Impact           : Information Disclosure
CVE ID           : CVE-2019-17655
Affected Products: FortiOS: 6.2.2, 6.2.1, 6.2.0, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 
                   6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.6.9, 5.6.8, 5.6.7, 5.6.6, 
                   5.6.5, 5.6.4, 5.6.3, 5.6.2, 5.6.13, 5.6.12, 5.6.11, 5.6.10, 5.6.1, 
                   5.6.0, 5.4.9, 5.4.8, 5.4.7, 5.4.6, 5.4.5, 5.4.4, 5.4.3, 5.4.2, 
                   5.4.13, 5.4.12, 5.4.11, 5.4.10, 5.4.1, 5.4.0, 5.2.9, 5.2.8, 5.2.7, 
                   5.2.6, 5.2.5, 5.2.4, 5.2.3, 5.2.2, 5.2.15, 5.2.14, 5.2.13, 5.2.12, 
                   5.2.11, 5.2.10, 5.2.1, 5.2.0
Language         : English
                   Portuguese

Summary

A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL
VPN may allow an attacker to retrieve a logged-in SSL VPN user's credentials
should that attacker be able to read the session file stored on the targeted
device's system.


To successfully exploit this weakness, another unrelated weakness (eg: a system
file leaking vulnerability) would therefore need to be exploited first.

Affected Products

FortiOS 6.2.0 to 6.2.2, 6.0.9 and below, 5.6.13 and below

Solutions

Upgrade to FortiOS 5.6.14 or 6.0.10 or 6.2.3 or above


Revision History:
2020-01-27 Initial Version
2020-06-26 New fix on 6.0.10 released.
2021-07-29 New fix on 5.6.14 released.

References

  o https://blog.orange.tw/2019/08/
    attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=eic/
-----END PGP SIGNATURE-----