By now, many of you have heard of the Heartbleed bug, which is a recently disclosed vulnerability that was discovered in OpenSSL versions 1.0.1 through 1.0.1f. This vulnerability may allow an attacker to access sensitive information from memory by sending specially-crafted TLS heartbeat requests. Despite the media hype about this vulnerability, it is worth calling out the facts. Not all Fortinet products were impacted by this bug. In fact, many of our products, such as our FortiWeb (WAF) products, were immune from day one. However, some of our product lines were affected. This includes: FortiGate (FortiOS) 5.0.0 up to 5.0.6 FortiAuthenticator 3.x FortiMail 4.3.x and 5.x FortiVoice models 200D, 200D-T and VM FortiRecorder FortiADC D-Series models 1500D, 2000D and 4000D FortiADC E-Series 3.x Coyote Point Equalizer GX / LX 10.x AscenLink v7.0 and v7.1-B5599 FortiDDoS 4.x FortiDNS Within hours of the discovery, our FortiGuard Labs product security (PSIRT) and security research teams began developing protections and releasing patches for a variety of Fortinet products. Our industry-leading security and threat researchers are well prepared to react to and protect our customers from threats such as Heartbleed, thanks to our existing critical update process. This process has been in place for nearly a decade. Our team is well equipped to analyze, develop, deploy and refactor critical IPS signatures within 48 hours of any breaking attack. Product Updates For FortiGate customers: A software update for FortiOS 5 is available for download on the support site at http://support.fortinet.com. This vulnerability is fixed in FortiOS version 5.0.7. Please note that FortiOS 4.3 (4.0MR3) and lower are not affected by this vulnerability. For FortiMail customers: Software updates for FortiMail 5.0 and 5.1 are now available at http://support.fortinet.com. This vulnerability is fixed in FortiMail versions 5.0.5 and 5.1.2. An update for FortiMail 4.3 will be released on Monday April 14th. For FortiVoice customers: Software updates for affected FortiVoice products will be released on or before Wednesday April 16th. Note that only FortiVoice 200D, 200D-T and VM products are affected. For FortiRecorder customers: An updated version of FortiRecorder software is now available on the Fortinet support site. This vulnerability is fixed in FortiRecorder version 1.4.1. For FortiADC and Coyote Point customers: Updates will be provided for FortiADC D-Series on or before Wednesday April 16th. The release timeline for FortiADC E-series and Coyote Point products can be found in the following advisory: http://www.coyotepoint.com/files/downloads/EqSecurityVulnerabilities.pdf For AscenLink customers: A software fix for AscenLink will be available in version 7.1-B5745, which will be available on the support site at http://support.fortinet.com on Tuesday, April 15th. For users with existing Xtera AscenLink systems still using firmware below V7.1 with Xtera Serial Numbers (AAAA-BBBB-CCCC-DDDD), or any issues accessing Fortinet Support, please contact ascenlink@fortinet.com. Firmware release dates for other products are pending. More information can be found here: http://www.fortiguard.com/advisory/FG-IR-14-011/ Protecting Against Heartbleed Attacks In addition to patching our own products in rapid succession, our FortiGuard Labs team developed an IPS signature to thwart potential Heartbleed attacks. Customers should make sure that they update their FortiGate IPS signatures in order to protect their network from Heartbleed-based attacks. The IPS signature was released in IPS update 4.476 and is named: " OpenSSL.TLOpenSSL.TLS.Heartbeat.Information.Disclosure" . On Friday, April 11, an additional out-of-band IPS update (4.480) was released to our customers providing additional protection under the same name against “reverse Heartbleed†attacks. Customers must have a current/active FortiGuard service subscription to get this IPS signature. Additionally, FortiWeb (our web application firewall) provides 100% protection against Heartbleed. When a FortiWeb hardware or virtual appliance is deployed inline using either Reverse Proxy or Transparent Proxy modes it will automatically protect all applications behind the web application firewall from this OpenSSL exploit. In summary, Fortinet wants you to know that of the small number of products that were affected by Heartbleed, we have patched most of these; the remaining patches to be released very soon. More so, we are pleased to state that our FortiGate IPS signatures and FortiWeb products provide protection against Heartbleed. Our threat research team continues to monitor this vulnerability, and we will provide further updates through our FortiGuard blog and security advisories. Sincerely, Michael Xie Co-Founder and Chief Technology Officer Fortinet Phone: 1-866-868-3678 www.fortinet.com
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1747 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.