Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
TC_Hessen
New Contributor

Heartbleed-Bug and Fortinet products

Hi, have a look at http://heartbleed.com/ - I made a test with some of our own Fortigates and with some of our customers and found, that they are affected. I tried to test the public ssl portals where valid ssl certificates have been installed. Can anyone check this please? A good site to run a test is http://possible.lv/tools/hb/
best regards, TC
best regards, TC
34 REPLIES 34
jtfinley
Contributor

Setup the IPS rule and checked again, still shows vulnerable. Also, it' s past 5pm PST, no firmware yet.
Quint
New Contributor

A Fortinet tech told me yesterday that 5.07 would not be released until June, hence the need for a workaround and an IPS signature. So 5.07 HAS been released? and is it a full OS upgrade or just a patch for Heartbleed?
Thank You
Thank You
Mike_Ferderer
New Contributor

It appears that FOS 4.3.x or 4.2.x didn' t use the more current and (heartbleed)vulnerable SSL implementation and therefore requires no change or is this incorrect? Release notes in 5.0.7 don' t cover this nor does the Fortinet advisory. Thanks!
jtfinley

Mike - 4.3.x appears to be NOT affected by this. I have updated several Fortigates with 5.0.7 and re-ran the vuln. check and it clears.
ede_pfau
SuperUser
SuperUser

I' ve checked 4.2.11, 4.3.15 and 5.0.6. According to http://possible.lv/tools/hb none of these were vulnerable. But, v5 seems to use the TLS handshake, the older version don' t.
Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
Dave_Hall
Honored Contributor

So 5.07 HAS been released? and is it a full OS upgrade or just a patch for Heartbleed?
Reviewed the patch notes and as far as I can tell it looks like just a patch for Heartbleed plus Fortinet boilerplate.

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C

NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
rwpatterson
Valued Contributor III

Check out the build numbers. This is based on another build.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com

Bob - self proclaimed posting junkie!See my Fortigate related scripts at: http://fortigate.camerabob.com
Quint
New Contributor

Has anyone found the IPS signature to work? I updated to IPS signature 4.00476 and the Fortigate still fails the Heartbleed test.
Thank You
Thank You
romanr
Valued Contributor

Hi, 5.0.7 fixes the Heartbleed vulnerability for the Fortigate itself - And the only difference from 5.0.6 is the OpenSSL implementation there - No other features added or other problems fixed! Actual IPS engine will protect SSL communication against the Heartbleed attack (for sure only if it is properly configured in your firewall policies!!) - I did test for 10+ systems and I didn' t find one yet, where IPS didn' t catch it! br, Roman
simonorch
Contributor

I' m certainly getting hits on the IPS signature, but how accurate is the sig? i notice that the default setting for it is pass so is it going to generate false positives? A word of warning, ask TAC before you consider patching if you' re running a post patch6 interim build. I' ve got one customer on build 274 because of an httpsd bug and we can' t patch to this release, even though the bug is due to be fixed in patch 7 GA and this openssl patch is being called 7.
Senior Consultant working with Fortinet products since 2009
Senior Consultant working with Fortinet products since 2009
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors