ID

VAR-201702-0119


CVE

CVE-2016-8495


TITLE

Fortinet FortiManager Vulnerabilities in authentication information incomplete

Trust: 0.8

sources: JVNDB: JVNDB-2016-007804

DESCRIPTION

An improper certificate validation vulnerability in Fortinet FortiManager 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1 allows remote attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack via the Fortisandbox devices probing feature. FortiManager is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain potentially sensitive information. Information obtained may aid in further attacks. FortiManager 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1 are vulnerable. Fortinet FortiManager is a centralized network security management platform developed by Fortinet. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management. A security vulnerability exists in Fortinet FortiManager due to the program not properly validating TLS certificates

Trust: 1.98

sources: NVD: CVE-2016-8495 // JVNDB: JVNDB-2016-007804 // BID: 96157 // VULHUB: VHN-97315

AFFECTED PRODUCTS

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4.1

Trust: 1.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.9

Trust: 1.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.8

Trust: 1.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.7

Trust: 1.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.6

Trust: 1.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.3

Trust: 1.6

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.10

Trust: 1.6

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.4

Trust: 1.6

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4.0

Trust: 1.6

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.5

Trust: 1.6

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.7

Trust: 1.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.6

Trust: 1.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.2

Trust: 1.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.1

Trust: 1.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.4

Trust: 1.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.3

Trust: 1.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.11

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.6 to 5.2.7

Trust: 0.8

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4.0 to 5.4.1

Trust: 0.8

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.5

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:neversion:5.4.2

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:neversion:5.2.8

Trust: 0.3

sources: BID: 96157 // JVNDB: JVNDB-2016-007804 // CNNVD: CNNVD-201702-474 // NVD: CVE-2016-8495

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-8495
value: HIGH

Trust: 1.0

NVD: CVE-2016-8495
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201702-474
value: MEDIUM

Trust: 0.6

VULHUB: VHN-97315
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-8495
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-97315
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-8495
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-97315 // JVNDB: JVNDB-2016-007804 // CNNVD: CNNVD-201702-474 // NVD: CVE-2016-8495

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-97315 // JVNDB: JVNDB-2016-007804 // NVD: CVE-2016-8495

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-474

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201702-474

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007804

PATCH

title:FortiManager TLS certificate validation failureurl:https://fortiguard.com/advisory/FG-IR-16-055

Trust: 0.8

title:Fortinet FortiManager Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67763

Trust: 0.6

sources: JVNDB: JVNDB-2016-007804 // CNNVD: CNNVD-201702-474

EXTERNAL IDS

db:NVDid:CVE-2016-8495

Trust: 2.8

db:BIDid:96157

Trust: 1.4

db:SECTRACKid:1037805

Trust: 1.1

db:JVNDBid:JVNDB-2016-007804

Trust: 0.8

db:CNNVDid:CNNVD-201702-474

Trust: 0.7

db:VULHUBid:VHN-97315

Trust: 0.1

sources: VULHUB: VHN-97315 // BID: 96157 // JVNDB: JVNDB-2016-007804 // CNNVD: CNNVD-201702-474 // NVD: CVE-2016-8495

REFERENCES

url:https://fortiguard.com/advisory/fg-ir-16-055

Trust: 2.0

url:http://www.securityfocus.com/bid/96157

Trust: 1.1

url:http://www.securitytracker.com/id/1037805

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8495

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8495

Trust: 0.8

url:http://www.fortinet.com/products/fortimanager/

Trust: 0.3

url:http://www.fortinet.com/

Trust: 0.3

sources: VULHUB: VHN-97315 // BID: 96157 // JVNDB: JVNDB-2016-007804 // CNNVD: CNNVD-201702-474 // NVD: CVE-2016-8495

CREDITS

AirBus security team

Trust: 0.3

sources: BID: 96157

SOURCES

db:VULHUBid:VHN-97315
db:BIDid:96157
db:JVNDBid:JVNDB-2016-007804
db:CNNVDid:CNNVD-201702-474
db:NVDid:CVE-2016-8495

LAST UPDATE DATE

2024-08-14T15:18:50.796000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-97315date:2017-07-25T00:00:00
db:BIDid:96157date:2017-03-07T10:02:00
db:JVNDBid:JVNDB-2016-007804date:2017-03-17T00:00:00
db:CNNVDid:CNNVD-201702-474date:2017-02-14T00:00:00
db:NVDid:CVE-2016-8495date:2017-07-25T01:29:03.357

SOURCES RELEASE DATE

db:VULHUBid:VHN-97315date:2017-02-13T00:00:00
db:BIDid:96157date:2017-02-08T00:00:00
db:JVNDBid:JVNDB-2016-007804date:2017-03-17T00:00:00
db:CNNVDid:CNNVD-201702-474date:2017-02-14T00:00:00
db:NVDid:CVE-2016-8495date:2017-02-13T15:59:00.167