CVE-2019-5591

Published Aug 14, 2020

Last updated 8 months ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2019-5591 is a default configuration vulnerability that affects FortiOS. It exists because, under the default configuration, FortiGate SSL VPN does not verify the certificate when a Lightweight Directory Access Protocol (LDAP) server sends a connection request. An unauthenticated attacker on the same subnet could exploit this vulnerability by impersonating the LDAP server and connecting to a vulnerable FortiGate device. Successful exploitation could allow the attacker to intercept sensitive information intended for a legitimate LDAP server.

Description
A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.
Source
psirt@fortinet.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
6.5
Impact score
3.6
Exploitability score
2.8
Vector string
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
3.3
Impact score
2.9
Exploitability score
6.5
Vector string
AV:A/AC:L/Au:N/C:P/I:N/A:N

Known exploits

Data from CISA

Vulnerability name
Fortinet FortiOS Default Configuration Vulnerability
Exploit added on
Nov 3, 2021
Exploit action due
May 3, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-306
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-306

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

35

Configurations