FortiOS SSH Update

22 Jan
Company, Industry, News, Partners

 

On January 13, 2016 we reported about a FortiOS SSH exploit, and it looks like it has a larger scope than originally reported.

After the original report, Fortinet further investigated their product line and discovered the same vulnerability on some versions of FortiSwitch, FortiAnalyzer and FortiCache. In a previous statement from Fortinet, they noted that it is not a malicious backdoor, rather an unintentional consequence of a feature that was designed to provide seamless access from an authorized FortiManager to registered FortiGate devices.

On January 20, 2016 they provided a software that removes the vulnerability, and covers the legacy and end-of-life products. Again, if you are a Secure Sense customer, we have already resolved this for you. If you are not, it is strongly recommended that all customers using the following products update their systems with the highest priority:

  • FortiAnalyzer: 5.0.5 to 5.0.11 and 5.2.0 to 5.2.4 (branch 4.3 is not affected)
  • FortiSwitch: 3.3.0 to 3.3.2
  • FortiCache: 3.0.0 to 3.0.7 (branch 3.1 is not affected)
  • FortiOS 4.1.0 to 4.1.10
  • FortiOS 4.2.0 to 4.2.15
  • FortiOS 4.3.0 to 4.3.16
  • FortiOS 5.0.0 to 5.0.7

Connect with Secure Sense to protect data, your network, and systems 24/7, 365 days a year. If you have questions or want to learn more, please contact Secure Sense by calling 866-999-7506.

Follow us on LinkedIn and follow us on Twitter for current company and industry news.