ID

VAR-201306-0360


CVE

CVE-2013-4669


TITLE

plural OS Run on FortiClient Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2013-003119

DESCRIPTION

FortiClient before 4.3.5.472 on Windows, before 4.0.3.134 on Mac OS X, and before 4.0 on Android; FortiClient Lite before 4.3.4.461 on Windows; FortiClient Lite 2.0 through 2.0.0223 on Android; and FortiClient SSL VPN before 4.0.2258 on Linux proceed with an SSL session after determining that the server's X.509 certificate is invalid, which allows man-in-the-middle attackers to obtain sensitive information by leveraging a password transmission that occurs before the user warning about the certificate problem. Fortinet FortiClient VPN client is prone to a security-bypass vulnerability because the application fails to properly validate SSL certificates from the server. An attacker can exploit this issue to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. Fortinet FortiClient, FortiClient Lite and FortiClient SSL VPN are all products of Fortinet. FortiClient is a suite of software solutions that provide security for endpoints, providing features such as IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication. FortiClient Lite is a free antivirus software that offers malware detection, real-time protection, parental controls, web filtering, and more. FortiClient SSL VPN is an integrated software in FortiClient products, which mainly provides virtual private network technology. Vulnerabilities exist in the following versions: Windows-based FortiClient prior to 4.3.5.472, Mac OS X-based FortiClient prior to 4.0.3.134, Android-based FortiClient prior to 4.0, Windows-based FortiClient Lite 4.3.4.461 Previous versions, FortiClient Lite 2.0 to 2.0.0223 based on the Android platform, versions earlier than FortiClient SSL VPN 4.0.2258 based on the Linux platform

Trust: 1.98

sources: NVD: CVE-2013-4669 // JVNDB: JVNDB-2013-003119 // BID: 59604 // VULHUB: VHN-64671

AFFECTED PRODUCTS

vendor:fortinetmodel:forticlient ssl vpnscope:lteversion:4.0.2012

Trust: 1.0

vendor:fortinetmodel:forticlientscope:lteversion:4.3.3.445

Trust: 1.0

vendor:fortinetmodel:forticlient litescope:lteversion:2.0

Trust: 1.0

vendor:fortinetmodel:forticlientscope:lteversion:4.0.2

Trust: 1.0

vendor:fortinetmodel:forticlient litescope:lteversion:4.3.3.445

Trust: 1.0

vendor:fortinetmodel:forticlientscope:ltversion:4.0 (android for )

Trust: 0.8

vendor:fortinetmodel:forticlientscope:ltversion:4.0.3.134 (mac os x for )

Trust: 0.8

vendor:fortinetmodel:forticlientscope:ltversion:4.3.5.472 (windows for )

Trust: 0.8

vendor:fortinetmodel:forticlient litescope:eqversion:2.0 to 2.0.0223 (android for )

Trust: 0.8

vendor:fortinetmodel:forticlient litescope:ltversion:4.3.4.461 (windows for )

Trust: 0.8

vendor:fortinetmodel:forticlient ssl vpnscope:ltversion:4.0.2258 (linux for )

Trust: 0.8

vendor:fortinetmodel:forticlient litescope:eqversion:2.0

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:4.3.3.445

Trust: 0.6

vendor:fortinetmodel:forticlient litescope:eqversion:4.3.3.445

Trust: 0.6

vendor:fortinetmodel:forticlient ssl vpnscope:eqversion:4.0.2012

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:4.0.2

Trust: 0.6

sources: JVNDB: JVNDB-2013-003119 // CNNVD: CNNVD-201305-079 // NVD: CVE-2013-4669

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-4669
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-4669
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201305-079
value: MEDIUM

Trust: 0.6

VULHUB: VHN-64671
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-4669
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-64671
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-64671 // JVNDB: JVNDB-2013-003119 // CNNVD: CNNVD-201305-079 // NVD: CVE-2013-4669

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-64671 // JVNDB: JVNDB-2013-003119 // NVD: CVE-2013-4669

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201305-079

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201305-079

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-003119

PATCH

title:Potential Man-In-The Middle Vulnerability in FortiClient VPNurl:http://www.fortiguard.com/advisory/Potential-Man-In-The-Middle-Vulnerability-in-FortiClient-VPN/

Trust: 0.8

sources: JVNDB: JVNDB-2013-003119

EXTERNAL IDS

db:NVDid:CVE-2013-4669

Trust: 2.5

db:BIDid:59604

Trust: 2.0

db:JVNDBid:JVNDB-2013-003119

Trust: 0.8

db:CNNVDid:CNNVD-201305-079

Trust: 0.7

db:FULLDISCid:20130501 FORTICLIENT VPN CLIENT CREDENTIAL INTERCEPTION VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-64671

Trust: 0.1

sources: VULHUB: VHN-64671 // BID: 59604 // JVNDB: JVNDB-2013-003119 // CNNVD: CNNVD-201305-079 // NVD: CVE-2013-4669

REFERENCES

url:http://www.securityfocus.com/bid/59604

Trust: 1.7

url:http://www.fortiguard.com/advisory/potential-man-in-the-middle-vulnerability-in-forticlient-vpn/

Trust: 1.7

url:http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0001.html

Trust: 1.7

url:http://objectif-securite.ch/forticlient_bulletin.php

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4669

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4669

Trust: 0.8

url:http://www.fortinet.com/

Trust: 0.3

sources: VULHUB: VHN-64671 // BID: 59604 // JVNDB: JVNDB-2013-003119 // CNNVD: CNNVD-201305-079 // NVD: CVE-2013-4669

CREDITS

Cedric Tissieres, Philippe Oechslin

Trust: 0.9

sources: BID: 59604 // CNNVD: CNNVD-201305-079

SOURCES

db:VULHUBid:VHN-64671
db:BIDid:59604
db:JVNDBid:JVNDB-2013-003119
db:CNNVDid:CNNVD-201305-079
db:NVDid:CVE-2013-4669

LAST UPDATE DATE

2024-11-23T23:05:53.803000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-64671date:2015-11-04T00:00:00
db:BIDid:59604date:2013-05-01T00:00:00
db:JVNDBid:JVNDB-2013-003119date:2016-02-10T00:00:00
db:CNNVDid:CNNVD-201305-079date:2013-06-27T00:00:00
db:NVDid:CVE-2013-4669date:2024-11-21T01:56:01.707

SOURCES RELEASE DATE

db:VULHUBid:VHN-64671date:2013-06-25T00:00:00
db:BIDid:59604date:2013-05-01T00:00:00
db:JVNDBid:JVNDB-2013-003119date:2013-06-27T00:00:00
db:CNNVDid:CNNVD-201305-079date:2013-05-03T00:00:00
db:NVDid:CVE-2013-4669date:2013-06-25T14:38:18.287