DescriptionThe Rapid7 vulnerability scanner reports the following
security risk: "TLS/SSL Server Is Using Commonly Used Prime Numbers"The
detailed description is:"The server is using a common or default prime
number as a parameter during the Diffie-H...
Description The automatic scanner tools mentioned below have been
identified to incorrectly report FortiGate web admin GUI support "Secure
Client-Initiated Renegotiation" or "Client-initiated Renegotiations".a)
testssl.sh (v2.8rc3 https://testssl.sh/...
DescriptionThe Nessus plugin "Multiple Ethernet Driver Frame Padding
Information Disclosure (Etherleak)" may report the FortiGate to be
vulnerable to CVE-2003-0001. SolutionThis is a false positive from the
Nessus vulnerability scanner.FortiGate devi...
DescriptionThe BeyondTrust Retina scanner reports that FortiManager is
vulnerable to multiple OpenSSH vulnerabilities.It includes
CVE-2015-5352, CVE-2015-5600, CVE-2015-6564 and
CVE-2015-6565.SolutionThe current version of OpenSSH embedded in
DescriptionSLOTH main concern is about to attack TLS 1.2 client
authentication (The TLS server has a certificate list that are valid and
the client must provide it) with RSA-MD5 as the chosen signature
algorithm.The following two important things not...
Hi guys, Thanks for the nss link. I know exactly what you refer to. In
fact the problem was two-fold. 1/ Avengine was unable to detect the
virus when using some packers in the testing plan. As the avengine
detected nothing then the virus was send for...
Hello, Feel free to read the following Microsoft KB article:
http://support.microsoft.com/kb/822659 And maybe this forum post could
Hello Ede, It is really surprising that packers could be the root cause
of detection failures. Could you please elaborate about your testing
plan and fortisandbox deployment mode used? Regards, Francois