Improper Input Validation in Fortinet FortiGate Firewall Products
CVE-2020-15936
2.6LOW
Summary
An improper input validation vulnerability in Fortinet's FortiGate firewalls allows attackers to exploit SNI Client Hello TLS packets, potentially disclosing sensitive information. This issue affects various versions of the FortiGate firewall, specifically those earlier than 6.4.3, 6.2.5, 6.0.11, and 5.6.13. Organizations utilizing these versions should apply the necessary updates to mitigate this exposure.
Affected Version(s)
Fortinet FortiOS FortiOS 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.6.13, 5.6.12, 5.6.11, 5.6.10, 5.6.9, 5.6.8, 5.6.7, 5.6.6, 5.6.5, 5.6.4, 5.6.3, 5.6.2, 5.6.1, 5.6.0
References
CVSS V3.1
Score:
2.6
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved