QID 379366
Date Published: 2024-03-07
QID 379366: Fortinet FortiAnalyzer and FortiManager - Improper Access Control Vulnerability (FG-IR-23-490)
CVE-2023-44253: The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers.
Affected Products:
FortiManager version 7.4.2
FortiAnalyzer version 7.4.2
QID Detection Logic (Authenticated):
Detection checks for vulnerable versions of FortiManager and FortiAnalyzer.
Successful exploitation of this vulnerability may allow an adom administrator to enumerate other adoms and device names via crafted HTTP or HTTPS requests.
Vendor has released fixes to address this vulnerability
For more details refer advisory FG-IR-23-268
- FG-IR-23-490 -
www.fortiguard.com/psirt/FG-IR-23-490
CVEs related to QID 379366
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| FG-IR-23-490 |
|