CVE-2016-8495
moderate-risk
Published 2017-02-13
An improper certificate validation vulnerability in Fortinet FortiManager 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1 allows remote attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack via the Fortisandbox devices probing feature.
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.4/10
High
NETWORK
/ HIGH complexity
Affected Products (18)
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Fortimanager Firmware
Affected Vendors
References (6)
Third Party Advisory
http://www.securityfocus.com/bid/96157
Vendor Advisory
https://fortiguard.com/advisory/FG-IR-16-055
Third Party Advisory
http://www.securityfocus.com/bid/96157
Vendor Advisory
https://fortiguard.com/advisory/FG-IR-16-055
42
/ 100
moderate-risk
Severity
22/34 · High
Exploitability
1/34 · Minimal
Exposure
19/34 · Moderate