It is possible to predict TCP/IP Initial Sequence Numbers for the remote host.
The remote host has predictable TCP sequence numbers.
An attacker may use this flaw to establish spoofed TCP connections to this host.
How does fortigate mitigate this? FortiGate
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Dear iamkaylion,
I guess you are talking about the vulnerability CVE-2001-0328. .This was already addressed by Fortigate long back in software version 5.2.9 or above.
If you want to know more details you can check below link from fortinet.
https://www.fortiguard.com/psirt/FG-IR-16-039
Dear iamkaylion,
I guess you are talking about the vulnerability CVE-2001-0328. .This was already addressed by Fortigate long back in software version 5.2.9 or above.
If you want to know more details you can check below link from fortinet.
https://www.fortiguard.com/psirt/FG-IR-16-039
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1519 | |
1019 | |
749 | |
443 | |
209 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.