Improper Input Validation in Fortinet FortiGate Firewall Products
CVE-2020-15936

2.6LOW

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
1 March 2022

Summary

An improper input validation vulnerability in Fortinet's FortiGate firewalls allows attackers to exploit SNI Client Hello TLS packets, potentially disclosing sensitive information. This issue affects various versions of the FortiGate firewall, specifically those earlier than 6.4.3, 6.2.5, 6.0.11, and 5.6.13. Organizations utilizing these versions should apply the necessary updates to mitigate this exposure.

Affected Version(s)

Fortinet FortiOS FortiOS 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.6.13, 5.6.12, 5.6.11, 5.6.10, 5.6.9, 5.6.8, 5.6.7, 5.6.6, 5.6.5, 5.6.4, 5.6.3, 5.6.2, 5.6.1, 5.6.0

References

CVSS V3.1

Score:
2.6
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.