CVE-2018-13382
CRITICAL
9,1
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: none
MEDIUM
5,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: partial
Availability: none
Description
AI Translation Available
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,8610
Percentile
1,0th
Updated
EPSS Score Trend (Last 90 Days)
View on Exploit-DB GHDB
advisories and vulnerabilities
Google Query:
https://www.google.com/search?q=intitle%3A%22Please+Login%22+%22Use+FTM+Push%22
Author: Alexandros Pappas
Date: 2020-11-24
863
Incorrect Authorization
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Access Control
Availability
Potential Impacts:
Read Application Data
Read Files Or Directories
Modify Application Data
Modify Files Or Directories
Gain Privileges Or Assume Identity
Bypass Protection Mechanism
Execute Unauthorized Code Or Commands
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Other)
Applicable Platforms
Technologies:
Database Server, Not Technology-Specific, Web Server
Exploit
Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User …
Fortinet FortiOS 6.0.4 - Unauthenticated SSL VPN User Password Modification
View Exploit Code →
Operating System
Fortios by Fortinet
Version Range Affected
From
5.4.1
(inclusive)
To
5.4.11
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Fortiproxy by Fortinet
Version Range Affected
To
1.2.9
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Fortios by Fortinet
Version Range Affected
From
5.6.0
(inclusive)
To
5.6.9
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Fortios by Fortinet
Version Range Affected
From
6.0.0
(inclusive)
To
6.0.5
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Fortiproxy by Fortinet
CPE Identifier
View Detailed Analysis
cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018…
https://fortiguard.com/advisory/FG-IR-18-389
https://www.fortiguard.com/psirt/FG-IR-20-231
https://fortiguard.com/advisory/FG-IR-18-389
https://www.fortiguard.com/psirt/FG-IR-20-231