Vulnerability Description
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiproxy | < 1.2.9 |
| Fortinet | Fortios | >= 5.4.1, < 5.4.11 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/advisory/FG-IR-18-389Vendor Advisory
- https://www.fortiguard.com/psirt/FG-IR-20-231Vendor Advisory
- https://fortiguard.com/advisory/FG-IR-18-389Vendor Advisory
- https://www.fortiguard.com/psirt/FG-IR-20-231Vendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-US Government Resource
FAQ
What is CVE-2018-13382?
CVE-2018-13382 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web po...
How severe is CVE-2018-13382?
CVE-2018-13382 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-13382?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiproxy, Fortinet Fortios.