Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
TC_Hessen
New Contributor

Heartbleed-Bug and Fortinet products

Hi, have a look at http://heartbleed.com/ - I made a test with some of our own Fortigates and with some of our customers and found, that they are affected. I tried to test the public ssl portals where valid ssl certificates have been installed. Can anyone check this please? A good site to run a test is http://possible.lv/tools/hb/
best regards, TC
best regards, TC
34 REPLIES 34
jtfinley
Contributor

Setup the IPS rule and checked again, still shows vulnerable. Also, it' s past 5pm PST, no firmware yet.
Quint
New Contributor

A Fortinet tech told me yesterday that 5.07 would not be released until June, hence the need for a workaround and an IPS signature. So 5.07 HAS been released? and is it a full OS upgrade or just a patch for Heartbleed?
Thank You
Thank You
Mike_Ferderer
New Contributor

It appears that FOS 4.3.x or 4.2.x didn' t use the more current and (heartbleed)vulnerable SSL implementation and therefore requires no change or is this incorrect? Release notes in 5.0.7 don' t cover this nor does the Fortinet advisory. Thanks!
jtfinley

Mike - 4.3.x appears to be NOT affected by this. I have updated several Fortigates with 5.0.7 and re-ran the vuln. check and it clears.
ede_pfau
SuperUser
SuperUser

I' ve checked 4.2.11, 4.3.15 and 5.0.6. According to http://possible.lv/tools/hb none of these were vulnerable. But, v5 seems to use the TLS handshake, the older version don' t.

Ede


"Kernel panic: Aiee, killing interrupt handler!"
Ede"Kernel panic: Aiee, killing interrupt handler!"
Dave_Hall
Honored Contributor

So 5.07 HAS been released? and is it a full OS upgrade or just a patch for Heartbleed?
Reviewed the patch notes and as far as I can tell it looks like just a patch for Heartbleed plus Fortinet boilerplate.

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
rwpatterson
Valued Contributor III

Check out the build numbers. This is based on another build.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
Quint
New Contributor

Has anyone found the IPS signature to work? I updated to IPS signature 4.00476 and the Fortigate still fails the Heartbleed test.
Thank You
Thank You
romanr
Valued Contributor

Hi, 5.0.7 fixes the Heartbleed vulnerability for the Fortigate itself - And the only difference from 5.0.6 is the OpenSSL implementation there - No other features added or other problems fixed! Actual IPS engine will protect SSL communication against the Heartbleed attack (for sure only if it is properly configured in your firewall policies!!) - I did test for 10+ systems and I didn' t find one yet, where IPS didn' t catch it! br, Roman
simonorch
Contributor

I' m certainly getting hits on the IPS signature, but how accurate is the sig? i notice that the default setting for it is pass so is it going to generate false positives? A word of warning, ask TAC before you consider patching if you' re running a post patch6 interim build. I' ve got one customer on build 274 because of an httpsd bug and we can' t patch to this release, even though the bug is due to be fixed in patch 7 GA and this openssl patch is being called 7.

NSE8
Fortinet Expert partner - Norway

NSE8Fortinet Expert partner - Norway
Labels
Top Kudoed Authors