CVE-2019-5591

Published Aug 14, 2020

Last updated a month ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2019-5591 is a default configuration vulnerability that affects FortiOS. It exists because, under the default configuration, FortiGate SSL VPN does not verify the certificate when a Lightweight Directory Access Protocol (LDAP) server sends a connection request. An unauthenticated attacker on the same subnet could exploit this vulnerability by impersonating the LDAP server and connecting to a vulnerable FortiGate device. Successful exploitation could allow the attacker to intercept sensitive information intended for a legitimate LDAP server.

Description
A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.
Source
psirt@fortinet.com
NVD status
Analyzed
Products
fortios

Risk scores

CVSS 3.1

Type
Primary
Base score
6.5
Impact score
3.6
Exploitability score
2.8
Vector string
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
3.3
Impact score
2.9
Exploitability score
6.5
Vector string
AV:A/AC:L/Au:N/C:P/I:N/A:N

Known exploits

Data from CISA

Vulnerability name
Fortinet FortiOS Default Configuration Vulnerability
Exploit added on
Nov 3, 2021
Exploit action due
May 3, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-306
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-306

Social media

Hype score
Not currently trending

Configurations