==================================================================== CERT-Renater Note d'Information No. 2016/VULN005 _____________________________________________________________________ DATE : 13/01/2016 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): FortiOS versions 4.3.x, 5.0.x prior to 4.3.17, 5.0.8. ====================================================================== http://www.fortiguard.com/advisory/fortios-ssh-undocumented-interactive-login-vulnerability _____________________________________________________________________ FortiOS SSH Undocumented Interactive Login Vulnerability Impact Remote console access to vulnerable devices with "Administrative Access" enabled for SSH. Affected Products FortiOS 4.3.0 to 4.3.16 FortiOS 5.0.0 to 5.0.7 Currently supported branches (FortiOS 5.2 and 5.4) are not affected. Risk High Solutions FortiOS branch 4.3: Upgrade to FortiOS 4.3.17 or later FortiOS branch 5.0: Upgrade to FortiOS 5.0.8 or later Workarounds: * Disable admin access via SSH on all interfaces, and use the Web GUI instead, or the console applet of the GUI for CLI access. * If SSH access is mandatory, in 5.0 one can restrict access to SSH to a minimal set of authorized IP addresses, via the Local In policies. ========================================================== Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================