Vulnerability CVE-2013-4669


Published: 2013-06-25

Description:
FortiClient before 4.3.5.472 on Windows, before 4.0.3.134 on Mac OS X, and before 4.0 on Android; FortiClient Lite before 4.3.4.461 on Windows; FortiClient Lite 2.0 through 2.0.0223 on Android; and FortiClient SSL VPN before 4.0.2258 on Linux proceed with an SSL session after determining that the server's X.509 certificate is invalid, which allows man-in-the-middle attackers to obtain sensitive information by leveraging a password transmission that occurs before the user warning about the certificate problem.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Forticlient VPN client credential interception vulnerability
Philippe Oechsli...
26.06.2013

CVSS2 => (AV:N/AC:H/Au:N/C:C/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.4/10
6.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
None
None
Affected software
Fortinet -> Forticlient 
Fortinet -> Forticlient lite 
Fortinet -> Forticlient ssl vpn 

 References:
http://www.securityfocus.com/bid/59604
http://www.fortiguard.com/advisory/Potential-Man-In-The-Middle-Vulnerability-in-FortiClient-VPN/
http://objectif-securite.ch/forticlient_bulletin.php
http://archives.neohapsis.com/archives/fulldisclosure/2013-05/0001.html

Copyright 2024, cxsecurity.com

 

Back to Top