PSIRT Advisories

The FortiGuard Labs Product Security Incident Response Team (PSIRT) continually test Fortinet hardware and software products, looking for vulnerabilities and weaknesses. Any such findings are fed back to Fortinet's development teams and serious issues are described along with protective solutions in the advisories below.

A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive...

Jul 26, 2019 Risk IR Number: FG-IR-19-037
FortiOS Explicit Web Proxy by default allows non-standard HTTP traffic. FortiOS SSL/SSH Inspection Profile by default allows non-standard...

Jul 24, 2019 Risk IR Number: FG-IR-19-111
Multiple Fortinet products may be affected by the following Linux Kernel vulnerability:CVE-2016-10229 Linux Kernel ipv4/udp.c...

Jul 24, 2019 Risk IR Number: FG-IR-17-118
FortiOS by default enables TCP timestamp response, which may lead to information disclosure.The TCP timestamp response can be...

Jul 24, 2019 Risk IR Number: FG-IR-16-090
Multiple padding oracle vulnerabilities (Zombie POODLE, GOLDENDOODLE, OpenSSL 0-length) in the CBC padding implementation of FortiOS...

Jul 23, 2019 Risk IR Number: FG-IR-19-145
Makers of popular wifi hacking tool hashcat have discovered a way to improve WPA/WPA2 password brute-forcing: Leveraging the PMKID...

Jul 23, 2019 Risk IR Number: FG-IR-18-199
Certificates taken out of service could potentially be improperly re-used. Impact detailFortinet has already taken steps to mitigate...

Jul 19, 2019 Risk IR Number: FG-IR-19-144
Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in FortiNAC admin webUI may allow an unauthenticated...

Jul 16, 2019 Risk IR Number: FG-IR-19-140