PSIRT Advisories

The FortiGuard Labs Product Security Incident Response Team (PSIRT) continually test Fortinet hardware and software products, looking for vulnerabilities and weaknesses. Any such findings are fed back to Fortinet's development teams and serious issues are described along with protective solutions in the advisories below.

A low privileged user may be able to execute arbitrary code by exploiting a FortiClientNamedPipe vulnerability.

Oct 31, 2017 Risk IR Number: FG-IR-16-095
An authenticated user may pass a specially crafted payload to the 'params' parameter of the JSON web API (URLs with /json) , which...

Oct 24, 2017 Risk IR Number: FG-IR-17-206
A reflected XSS vulnerability exists in FortiOS web GUI "Login Disclaimer" redir parameter. It is potentially exploitable by a...

Oct 24, 2017 Risk IR Number: FG-IR-17-113
Multiple Remote Code Execution (RCE) vulnerabilities (CVE-2017-12615, CVE-2017-12617) are affecting Apache Tomcat.

Oct 24, 2017 Risk IR Number: FG-IR-17-251
Several vulnerabilities affect the Wi-Fi Protected Access II (WPA2) protocol, potentially enabling Man-in-the-Middle (MitM) attacks...

Oct 16, 2017 Risk IR Number: FG-IR-17-196
The FortiWLC file management AP script download webUI page is affected by an OS Command Injection vulnerability which may allow...

Oct 13, 2017 Risk IR Number: FG-IR-17-119
The FortiWLC admin webUI is affected by XSS vulnerabilities, potentially exploitable by an authenticated user, via non-sanitized...

Oct 13, 2017 Risk IR Number: FG-IR-17-106
There exists a reflected cross-site scripting (XSS) vulnerability on FortiMail customized pre-authentication webmail login page,...

Oct 13, 2017 Risk IR Number: FG-IR-17-099