QID 379366

Date Published: 2024-03-07

QID 379366: Fortinet FortiAnalyzer and FortiManager - Improper Access Control Vulnerability (FG-IR-23-490)

CVE-2023-44253: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers.

Affected Products:
FortiManager version 7.4.2
FortiAnalyzer version 7.4.2

QID Detection Logic (Authenticated):
Detection checks for vulnerable versions of FortiManager and FortiAnalyzer.

Successful exploitation of this vulnerability may allow an adom administrator to enumerate other adoms and device names via crafted HTTP or HTTPS requests.

  • CVSS V3 rated as Medium - 5.9 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution

    Vendor has released fixes to address this vulnerability
    For more details refer advisory FG-IR-23-268

    Vendor References

    CVEs related to QID 379366

    Software Advisories
    Advisory ID Software Component Link
    FG-IR-23-490 URL Logo www.fortiguard.com/psirt/FG-IR-23-490