ID

VAR-201804-0647


CVE

CVE-2017-17543


TITLE

Fortinet FortiClient and FortiClient SSLVPN Client Vulnerabilities related to cryptographic strength

Trust: 0.8

sources: JVNDB: JVNDB-2017-013362

DESCRIPTION

Users' VPN authentication credentials are unsafely encrypted in Fortinet FortiClient for Windows 5.6.0 and below versions, FortiClient for Mac OSX 5.6.0 and below versions and FortiClient SSLVPN Client for Linux 4.4.2335 and below versions, due to the use of a static encryption key and weak encryption algorithms. Fortinet FortiClient and FortiClient SSLVPN Client Contains a cryptographic strength vulnerability.Information may be obtained. Fortinet FortiClient for Windows is a Windows-based mobile terminal security solution developed by Fortinet. The solution provides IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication when connected to FortiGate firewall appliances. There is a security vulnerability in the Fortinet FortiClient based on the Windows platform. The vulnerability stems from the program's use of static encryption keys and weak encryption algorithms. A remote attacker could exploit this vulnerability to disclose information

Trust: 1.8

sources: NVD: CVE-2017-17543 // JVNDB: JVNDB-2017-013362 // VULHUB: VHN-108576 // VULMON: CVE-2017-17543

AFFECTED PRODUCTS

vendor:fortinetmodel:forticlientscope:lteversion:5.6.0

Trust: 1.0

vendor:fortinetmodel:forticlient sslvpn clientscope:lteversion:4.4.2335

Trust: 1.0

vendor:fortinetmodel:forticlientscope:lteversion:5.6.0 (windows/mac osx)

Trust: 0.8

vendor:fortinetmodel:forticlient sslvpn clientscope:lteversion:4.4.2335 (linux)

Trust: 0.8

vendor:fortinetmodel:forticlient sslvpn clientscope:eqversion:4.4.2335

Trust: 0.6

vendor:fortinetmodel:forticlientscope:eqversion:5.6.0

Trust: 0.6

sources: JVNDB: JVNDB-2017-013362 // CNNVD: CNNVD-201712-456 // NVD: CVE-2017-17543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-17543
value: HIGH

Trust: 1.0

NVD: CVE-2017-17543
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201712-456
value: HIGH

Trust: 0.6

VULHUB: VHN-108576
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-17543
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-17543
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-108576
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-17543
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-108576 // VULMON: CVE-2017-17543 // JVNDB: JVNDB-2017-013362 // CNNVD: CNNVD-201712-456 // NVD: CVE-2017-17543

PROBLEMTYPE DATA

problemtype:CWE-326

Trust: 1.9

sources: VULHUB: VHN-108576 // JVNDB: JVNDB-2017-013362 // NVD: CVE-2017-17543

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-456

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201712-456

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013362

PATCH

title:FG-IR-17-214url:https://fortiguard.com/psirt/FG-IR-17-214

Trust: 0.8

title:Fortinet FortiClient for Windows Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=117527

Trust: 0.6

sources: JVNDB: JVNDB-2017-013362 // CNNVD: CNNVD-201712-456

EXTERNAL IDS

db:NVDid:CVE-2017-17543

Trust: 2.6

db:JVNDBid:JVNDB-2017-013362

Trust: 0.8

db:CNNVDid:CNNVD-201712-456

Trust: 0.7

db:VULHUBid:VHN-108576

Trust: 0.1

db:VULMONid:CVE-2017-17543

Trust: 0.1

sources: VULHUB: VHN-108576 // VULMON: CVE-2017-17543 // JVNDB: JVNDB-2017-013362 // CNNVD: CNNVD-201712-456 // NVD: CVE-2017-17543

REFERENCES

url:https://fortiguard.com/advisory/fg-ir-17-214

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17543

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-17543

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/326.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-108576 // VULMON: CVE-2017-17543 // JVNDB: JVNDB-2017-013362 // CNNVD: CNNVD-201712-456 // NVD: CVE-2017-17543

SOURCES

db:VULHUBid:VHN-108576
db:VULMONid:CVE-2017-17543
db:JVNDBid:JVNDB-2017-013362
db:CNNVDid:CNNVD-201712-456
db:NVDid:CVE-2017-17543

LAST UPDATE DATE

2024-11-23T22:48:44.527000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-108576date:2020-05-11T00:00:00
db:VULMONid:CVE-2017-17543date:2020-05-11T00:00:00
db:JVNDBid:JVNDB-2017-013362date:2018-06-27T00:00:00
db:CNNVDid:CNNVD-201712-456date:2020-05-06T00:00:00
db:NVDid:CVE-2017-17543date:2024-11-21T03:18:08.213

SOURCES RELEASE DATE

db:VULHUBid:VHN-108576date:2018-04-26T00:00:00
db:VULMONid:CVE-2017-17543date:2018-04-26T00:00:00
db:JVNDBid:JVNDB-2017-013362date:2018-06-27T00:00:00
db:CNNVDid:CNNVD-201712-456date:2017-12-12T00:00:00
db:NVDid:CVE-2017-17543date:2018-04-26T20:29:00.243