CVE-2016-2183 - 3DES Vulnerability - SWEET32

Summary

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
https://nvd.nist.gov/vuln/detail/CVE-2016-2183
https://nvd.nist.gov/vuln/detail/CVE-2016-6329

Version Affected Solution
FortiAnalyzer 6.2 Not affected Not Applicable
FortiAnalyzer 6.0 6.0.2 Upgrade to 6.0.3 or above
FortiAnalyzer 5.6 Not affected Not Applicable
FortiAnalyzer 5.4 5.4.6 through 5.4.7 Migrate to a fixed release
FortiAnalyzer 5.4 5.4.0 through 5.4.1 Migrate to a fixed release
FortiAnalyzer 5.2 5.2.0 through 5.2.9 Migrate to a fixed release
FortiCache 4.2 4.2.8 Upgrade to 4.2.9 or above
FortiCache 4.1 4.1.1 Upgrade to 4.1.2 or above
FortiCache 4.0 4.0 all versions Migrate to a fixed release
FortiCache 3.1 3.1 all versions Migrate to a fixed release
FortiCache 3.0 3.0 all versions Migrate to a fixed release
FortiCache 2.3 2.3 all versions Migrate to a fixed release
FortiCache 2.2 2.2 all versions Migrate to a fixed release
FortiCache 2.1 2.1 all versions Migrate to a fixed release
FortiCache 2.0 2.0 all versions Migrate to a fixed release
FortiCache 1.0 1.0 all versions Migrate to a fixed release
FortiCache 0.4 0.4.10 Migrate to a fixed release
FortiClientEMS 7.2 7.2.0 Upgrade to 7.2.1 or above
FortiClientEMS 7.0 7.0.6 through 7.0.8 Upgrade to 7.0.9 or above
FortiClientEMS 7.0 7.0.0 through 7.0.4 Upgrade to 7.0.9 or above
FortiClientEMS 1.2 1.2.1 Migrate to a fixed release
FortiClientEMS 1.0 1.0.0 through 1.0.2 Migrate to a fixed release
FortiManager 6.2 Not affected Not Applicable
FortiManager 6.0 6.0.2 Upgrade to 6.0.3 or above
FortiManager 5.6 Not affected Not Applicable
FortiManager 5.4 5.4.6 through 5.4.7 Migrate to a fixed release
FortiManager 5.4 5.4.0 through 5.4.1 Migrate to a fixed release
FortiManager 5.2 5.2.0 through 5.2.9 Migrate to a fixed release
FortiOS 5.6 Not affected Not Applicable
FortiOS 5.4 5.4.0 through 5.4.1 Upgrade to 5.4.2 or above
FortiOS 5.2 5.2.12 Upgrade to 5.2.10 or above
FortiOS 5.2 5.2.9 Upgrade to 5.2.10 or above
FortiOS 5.0 5.0.14 Upgrade to 5.0.15 or above
FortiPortal 5.0 5.0.0 Upgrade to 5.0.1 or above
FortiSwitch 6.2 Not affected Not Applicable
FortiSwitch 6.0 6.0.0 through 6.0.1 Upgrade to 6.0.2 or above
FortiSwitch 3.6 3.6.7 Upgrade to 3.6.8 or above
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

FortiOS Web adminUI:
After the upgrade ensure following CLI command set:


config system global
set strong-crypto enable
end


FortiOS SSL VPN Web Portal:
After the upgrade ensure ensure following CLI command set:


config vpn ssl settings
set algorithm high
end


Alternative, start from FortiOS 5.4.1, using following CLI command can disable 3des ciphers:


config vpn ssl settings
set banned-cipher 3DES
end


FortiOS VIP, WANOpt, VoIP:
After the upgrade ensure following CLI command set:


config wanopt settings
et tunnel-ssl-algorithm high
end
config firewall ssl-server
set ssl-algorithm high
end
config voip profile
edit [profile-name]
config sip
set ssl-algorithm high
end
next
end
config firewall vip
edit [vip-name]
set type server-load-balance
set server-type ssl
set ssl-algorithm high
next
end
config web-proxy explicit
set ssl-algorithm high
end


FortiOS webfilter override and authentication service:
After the upgrade ensure following CLI command set:


config system global
set strong-crypto enable
end