Vulnerability Description
The CAPWAP DTLS protocol implementation in Fortinet FortiOS 5.0 Patch 7 build 4457 uses the same certificate and private key across different customers' installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging the Fortinet_Factory certificate and private key. NOTE: FG-IR-15-002 says "The Fortinet_Factory certificate is unique to each device ... An attacker cannot therefore stage a MitM attack.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortios | 5.0.7 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2015/Jan/125Exploit
- http://www.fortiguard.com/advisory/FG-IR-15-002/Vendor Advisory
- http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiOS_MulExploit
- http://seclists.org/fulldisclosure/2015/Jan/125Exploit
- http://www.fortiguard.com/advisory/FG-IR-15-002/Vendor Advisory
- http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiOS_MulExploit
FAQ
What is CVE-2015-1571?
CVE-2015-1571 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The CAPWAP DTLS protocol implementation in Fortinet FortiOS 5.0 Patch 7 build 4457 uses the same certificate and private key across different customers' installations, which makes it easier for man-in...
How severe is CVE-2015-1571?
CVE-2015-1571 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1571?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortios.