SSH authentication bypass when RADIUS authentication is used
Summary
An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.2 | 7.2.0 through 7.2.1 | Upgrade to 7.2.2 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.7 | Upgrade to 7.0.8 or above |
| FortiOS 6.4 | 6.4.0 through 6.4.9 | Upgrade to 6.4.10 or above |
| FortiOS 6.2 | 6.2 all versions | Upgrade to 6.2.13 or above |
| FortiOS 6.0 | 6.0 all versions | Migrate to a fixed release |
| FortiProxy 7.2 | Not affected | Not Applicable |
| FortiProxy 7.0 | 7.0.0 through 7.0.6 | Upgrade to 7.0.7 or above |
| FortiProxy 2.0 | 2.0.0 through 2.0.10 | Upgrade to 2.0.11 or above |
| FortiProxy 1.2 | 1.2 all versions | Migrate to a fixed release |
| FortiProxy 1.1 | Not affected | Not Applicable |