CVE-2015-1571Fortinet Fortios vulnerability

CWE-3104 documents4 sources
Severity
4.3MEDIUMNVD
EPSS
0.2%
top 63.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 10
Latest updateMay 17

Description

The CAPWAP DTLS protocol implementation in Fortinet FortiOS 5.0 Patch 7 build 4457 uses the same certificate and private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the Fortinet_Factory certificate and private key. NOTE: FG-IR-15-002 says "The Fortinet_Factory certificate is unique to each device ... An attacker cannot therefore stage a MitM attack.

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages1 packages

NVDfortinet/fortios5.0.7

🔴Vulnerability Details

2
GHSA
GHSA-j86q-w3f9-5q6c: ** DISPUTED ** The CAPWAP DTLS protocol implementation in Fortinet FortiOS 52022-05-17
CVEList
CVE-2015-1571: The CAPWAP DTLS protocol implementation in Fortinet FortiOS 52015-02-10

💬Community

1
Bugzilla
pcre: Buffer overflow caused by certain patterns with an unmatched closing parenthesis (8.38/18)2015-12-02
CVE-2015-1571 — Fortinet Fortios vulnerability | cvebase