• Filter by Date
  • Filter by Risk
  • Filter by Affected Product

PSIRT Advisories

The FortiGuard Labs Product Security Incident Response Team (PSIRT) continually test Fortinet hardware and software products, looking for vulnerabilities and weaknesses. Any such findings are fed back to Fortinet's development teams and serious issues are described along with protective solutions in the advisories below.

A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive...

Jul 26, 2019 Risk IR Number: FG-IR-19-037
FortiClient for Windows could be subject to the following shut down or tampering attempts:a) User Interface or Command Line shut...

Jul 25, 2019 Risk IR Number: FG-IR-19-148
FortiOS Explicit Web Proxy by default allows non-standard HTTP traffic. FortiOS SSL/SSH Inspection Profile by default allows non-standard...

Jul 24, 2019 Risk IR Number: FG-IR-19-111
VM appliance lack of root file system integrity check may allow an attacker with read/write access to the VM image (before it...

Jul 24, 2019 Risk IR Number: FG-IR-19-017
Multiple padding oracle vulnerabilities (Zombie POODLE, GOLDENDOODLE, OpenSSL 0-length) in the CBC padding implementation of FortiOS...

Jul 23, 2019 Risk IR Number: FG-IR-19-145
Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in FortiNAC admin webUI may allow an unauthenticated...

Jul 16, 2019 Risk IR Number: FG-IR-19-140