CVE-2018-9195

Severity
5.9MEDIUM
EPSS
0.3%
top 46.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 21
Latest updateMay 24

Description

Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eavesdrop on and modify information (URL/SPAM services in FortiOS 5.6, and URL/SPAM/AV services in FortiOS 6.0.; URL rating in FortiClient) sent and received from Fortiguard severs by decrypting these messages. Affected products include FortiClient for Windows 6.0.6 and below, FortiOS 6.0.7 and below, FortiClient for Mac OS 6.2.1 and below.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6

Affected Packages5 packages

CVEListV5fortinet/forticlient_for_windowsFortiClient for Windows 6.0.6 and below
NVDfortinet/fortios6.0.6
CVEListV5fortinet/fortiosFortiOS 6.0.7 and below
CVEListV5fortinet/forticlient_for_mac_osFortiClient for Mac OS 6.2.1 and below

🔴Vulnerability Details

2
GHSA
GHSA-grw5-hmpf-442m: Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eave2022-05-24
CVEList
CVE-2018-9195: Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle with knowledge of the key to eave2019-11-21

📋Vendor Advisories

1
Fortinet
Use of a hardcoded cryptographic key in the FortiGuard services communication protocol may allow a Man in the middle wit...2019-11-21