Bypassing FortiGate security profiles via SNI in Client Hello

Summary

An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiOS may allow a privileged attacker to disclose sensitive information via SNI Client Hello TLS packets.

Affected Products

All FortiOS versions are impacted by this vulnerability.

Solutions

Given that there is no systematic way to detect all exfiltration attempts and to exhaustively enumerate all possibilities offered by exfiltration channels, Fortinet has addressed the issue by releasing a set of IPS signatures:
1. Python/SNICat.A!exploit https://www.fortiguard.com/encyclopedia/virus/10069638
2. SNIcat.Data.Exfiltration.Tool https://www.fortiguard.com/encyclopedia/ips/50952

Timeline

2022-03-01: Initial publication