I want to ask if this vulnerability can be deferred as it requires an authenticated vpn user.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Yes, this vulnerability means a VPN user after the authentication/VPN connected successfully can send spoofed packets, if your credentials are secured then you don't have to worry about this vulnerability.
From the link itself:
> An insufficient verification of data authenticity vulnerability [CWE-345] in FortiOS & FortiProxy SSL-VPN tunnel mode may allow an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
In other words, yes, this can only be exploited by a VPN user who successfully authenticated and connected.
Also note the part "to send (but not receive) packets", which functionally restricts the potential abuse to UDP packets (TCP wont make it past SYN-ACK).
Thank you so much.
Hello @lemonduck ,
The vulnerability occurs due to inadequate verification of the authenticity of data in SSL-VPN tunnel mode. This allows a user who is authenticated on the VPN to send packets that appear to originate from another user's IP address. However, the attacker cannot receive packets sent to the spoofed IP address. The issue can be resolved by upgrading to the specified versions or migrating to a fixed release as recommended.
let us know if you have any queries.
Thanks,
Pavan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1733 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.