Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Robert_Cerny
New Contributor II

CVE-2021-26858

Hi,

I checked our FG100E for new 0day MS Exchange exploit CVE-2021-26858 and found that it's listed in IPS database already, but action is set to PASS. Does it mean that it will go through to our Exchange server?

 

Thanks, 

 

Robert

FG-100C FG-100A FW-50B FG-60C
FG-100C FG-100A FW-50B FG-60C
2 REPLIES 2
Robert_Cerny
New Contributor II

Hi,

I love answering my own questions :) Please find an answer from IPS team below:

 

All our signatures are released as "Pass" initially as a precautionary step to monitor the signature upon initial release. The signature will be set to "Block" right after the signature is proven to be stable. We have requested the signature to be set to "Block". Barring any unforeseen circumstances, the update should be reflected in the next IPS definitions release.

If needed, please manually set the action of these signatures to Block in your IPS sensor.
FG-100C FG-100A FW-50B FG-60C
FG-100C FG-100A FW-50B FG-60C
comelfex

How does it identify the exploit exactly? It goes via https and Port 443, so the only thing I see is IP addresses. Or how does it work?
Labels
Top Kudoed Authors