ID

VAR-201306-0336


CVE

CVE-2013-4604


TITLE

Fortinet FortiGate Runs on the device FortiOS Vulnerable to reading arbitrary user records

Trust: 0.8

sources: JVNDB: JVNDB-2013-003118

DESCRIPTION

Fortinet FortiOS before 5.0.3 on FortiGate devices does not properly restrict Guest capabilities, which allows remote authenticated users to read, modify, or delete the records of arbitrary users by leveraging the Guest role. FortiGate running FortiOS is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. Versions prior to FortiOS 5.0.3 are vulnerable. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam. FortiGate is a network security platform. FortiGate is a network security platform. The vulnerability comes from the fact that the program does not properly limit the Guest capabilities

Trust: 1.98

sources: NVD: CVE-2013-4604 // JVNDB: JVNDB-2013-003118 // BID: 60571 // VULHUB: VHN-64606

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiosscope:eqversion:5.0.1

Trust: 1.9

vendor:fortinetmodel:fortiosscope:lteversion:5.0.2

Trust: 1.0

vendor:fortinetmodel:fortiosscope:eqversion:5.0.2

Trust: 0.9

vendor:fortinetmodel:fortiosscope:ltversion:5.0.3

Trust: 0.8

vendor:fortinetmodel:fortiosscope:eqversion:4.3.8

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:3.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.80

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.50

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.36

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.0.3

Trust: 0.3

sources: BID: 60571 // JVNDB: JVNDB-2013-003118 // CNNVD: CNNVD-201306-353 // NVD: CVE-2013-4604

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-4604
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-4604
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201306-353
value: MEDIUM

Trust: 0.6

VULHUB: VHN-64606
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-4604
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-64606
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-64606 // JVNDB: JVNDB-2013-003118 // CNNVD: CNNVD-201306-353 // NVD: CVE-2013-4604

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-64606 // JVNDB: JVNDB-2013-003118 // NVD: CVE-2013-4604

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201306-353

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201306-353

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003118

PATCH

title:Improper Guest User Permission Management Issue in FortiGateurl:http://www.fortiguard.com/advisory/FGA-2013-20/

Trust: 0.8

sources: JVNDB: JVNDB-2013-003118

EXTERNAL IDS

db:NVDid:CVE-2013-4604

Trust: 2.8

db:BIDid:60571

Trust: 1.0

db:JVNDBid:JVNDB-2013-003118

Trust: 0.8

db:CNNVDid:CNNVD-201306-353

Trust: 0.7

db:SECUNIAid:53875

Trust: 0.6

db:VULHUBid:VHN-64606

Trust: 0.1

sources: VULHUB: VHN-64606 // BID: 60571 // JVNDB: JVNDB-2013-003118 // CNNVD: CNNVD-201306-353 // NVD: CVE-2013-4604

REFERENCES

url:http://www.fortiguard.com/advisory/fga-2013-20/

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4604

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4604

Trust: 0.8

url:http://secunia.com/advisories/53875

Trust: 0.6

url:http://www.securityfocus.com/bid/60571

Trust: 0.6

url:https://www.fortinet.com/

Trust: 0.3

sources: VULHUB: VHN-64606 // BID: 60571 // JVNDB: JVNDB-2013-003118 // CNNVD: CNNVD-201306-353 // NVD: CVE-2013-4604

CREDITS

Anderson Freitas

Trust: 0.9

sources: BID: 60571 // CNNVD: CNNVD-201306-353

SOURCES

db:VULHUBid:VHN-64606
db:BIDid:60571
db:JVNDBid:JVNDB-2013-003118
db:CNNVDid:CNNVD-201306-353
db:NVDid:CVE-2013-4604

LAST UPDATE DATE

2024-11-23T22:39:05.217000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-64606date:2013-06-26T00:00:00
db:BIDid:60571date:2013-06-13T00:00:00
db:JVNDBid:JVNDB-2013-003118date:2013-06-27T00:00:00
db:CNNVDid:CNNVD-201306-353date:2013-06-26T00:00:00
db:NVDid:CVE-2013-4604date:2024-11-21T01:55:54.993

SOURCES RELEASE DATE

db:VULHUBid:VHN-64606date:2013-06-25T00:00:00
db:BIDid:60571date:2013-06-13T00:00:00
db:JVNDBid:JVNDB-2013-003118date:2013-06-27T00:00:00
db:CNNVDid:CNNVD-201306-353date:2013-06-20T00:00:00
db:NVDid:CVE-2013-4604date:2013-06-25T14:38:18.117