ID

VAR-201805-0118


CVE

CVE-2017-14187


TITLE

Fortinet FortiOS Vulnerabilities related to authorization, permissions, and access control

Trust: 0.8

sources: JVNDB: JVNDB-2017-013464

DESCRIPTION

A local privilege escalation and local code execution vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.8, and 5.2 and below versions allows attacker to execute unauthorized binary program contained on an USB drive plugged into a FortiGate via linking the aforementioned binary program to a command that is allowed to be run by the fnsysctl CLI command. Fortinet FortiOS Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet FortiOS is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges. The following versions are vulnerable: FortiOS 5.6.0 through 5.6.2 FortiOS 5.4.0 through 5.4.8 FortiOS 5.2 through below. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam

Trust: 1.98

sources: NVD: CVE-2017-14187 // JVNDB: JVNDB-2017-013464 // BID: 104312 // VULHUB: VHN-104884

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiosscope:lteversion:5.6.2

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:5.4.8

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:5.4.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:5.6.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:5.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:eqversion:5.4.3

Trust: 0.9

vendor:fortinetmodel:fortiosscope:eqversion:5.4.0

Trust: 0.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.0

Trust: 0.9

vendor:fortinetmodel:fortiosscope:lteversion:5.2

Trust: 0.8

vendor:fortinetmodel:fortiosscope:eqversion:5.4.0 to 5.4.8

Trust: 0.8

vendor:fortinetmodel:fortiosscope:eqversion:5.6.0 to 5.6.2

Trust: 0.8

vendor:fortinetmodel:fortiosscope:eqversion:5.6.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.6

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.8

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.7

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.6

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.5

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.4

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.13

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.9

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.8

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.7

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.7.7

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.19

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.17

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.15

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.10

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.9

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.8

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.2.13

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.2.12

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.1.11

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.1.10

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:3.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.80

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.50

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:2.36

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.6.1

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.6

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.5

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.4

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.12

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.11

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:5.0

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.18

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.16

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.14

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.13

Trust: 0.3

vendor:fortinetmodel:fortiosscope:eqversion:4.3.12

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.6.3

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.4.9

Trust: 0.3

sources: BID: 104312 // JVNDB: JVNDB-2017-013464 // CNNVD: CNNVD-201709-356 // NVD: CVE-2017-14187

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14187
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-14187
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201709-356
value: MEDIUM

Trust: 0.6

VULHUB: VHN-104884
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14187
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-104884
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14187
baseSeverity: MEDIUM
baseScore: 6.2
vectorString: CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.3
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-104884 // JVNDB: JVNDB-2017-013464 // CNNVD: CNNVD-201709-356 // NVD: CVE-2017-14187

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.1

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-104884 // JVNDB: JVNDB-2017-013464 // NVD: CVE-2017-14187

THREAT TYPE

local

Trust: 0.9

sources: BID: 104312 // CNNVD: CNNVD-201709-356

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201709-356

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013464

PATCH

title:FG-IR-17-245url:https://fortiguard.com/psirt/FG-IR-17-245

Trust: 0.8

title:Fortinet FortiOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100032

Trust: 0.6

sources: JVNDB: JVNDB-2017-013464 // CNNVD: CNNVD-201709-356

EXTERNAL IDS

db:NVDid:CVE-2017-14187

Trust: 2.8

db:BIDid:104312

Trust: 2.0

db:SECTRACKid:1040983

Trust: 1.7

db:JVNDBid:JVNDB-2017-013464

Trust: 0.8

db:CNNVDid:CNNVD-201709-356

Trust: 0.7

db:VULHUBid:VHN-104884

Trust: 0.1

sources: VULHUB: VHN-104884 // BID: 104312 // JVNDB: JVNDB-2017-013464 // CNNVD: CNNVD-201709-356 // NVD: CVE-2017-14187

REFERENCES

url:http://www.securityfocus.com/bid/104312

Trust: 1.7

url:https://fortiguard.com/advisory/fg-ir-17-245

Trust: 1.7

url:http://www.securitytracker.com/id/1040983

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14187

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-14187

Trust: 0.8

url:http://www.fortinet.com/products/fortimanager/

Trust: 0.3

url:https://fortiguard.com/psirt/fg-ir-17-245

Trust: 0.3

sources: VULHUB: VHN-104884 // BID: 104312 // JVNDB: JVNDB-2017-013464 // CNNVD: CNNVD-201709-356 // NVD: CVE-2017-14187

CREDITS

Shaanan Cohney of University of Pennsylvania

Trust: 0.3

sources: BID: 104312

SOURCES

db:VULHUBid:VHN-104884
db:BIDid:104312
db:JVNDBid:JVNDB-2017-013464
db:CNNVDid:CNNVD-201709-356
db:NVDid:CVE-2017-14187

LAST UPDATE DATE

2024-11-23T21:53:11.038000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-104884date:2019-10-03T00:00:00
db:BIDid:104312date:2018-05-18T00:00:00
db:JVNDBid:JVNDB-2017-013464date:2018-07-12T00:00:00
db:CNNVDid:CNNVD-201709-356date:2019-10-23T00:00:00
db:NVDid:CVE-2017-14187date:2024-11-21T03:12:19.473

SOURCES RELEASE DATE

db:VULHUBid:VHN-104884date:2018-05-24T00:00:00
db:BIDid:104312date:2018-05-18T00:00:00
db:JVNDBid:JVNDB-2017-013464date:2018-07-12T00:00:00
db:CNNVDid:CNNVD-201709-356date:2017-09-12T00:00:00
db:NVDid:CVE-2017-14187date:2018-05-24T20:29:00.210