OpenBCM V1.07b11 (WIN32)

Packet Radio Mailbox

DBO595

[LAU JN59RM]

 Login: GAST





  

HB1PMS > TECH     21.01.20 15:03l 77 Lines 3421 Bytes #999 (0) @ WW
BID : 5644HB1PMS
Read: GAST
Subj: FortiSIEM Suffers From Hardcoded SSH Key Vulnerabi
Path: DBO595<DBX320<FRB024<NL3TD<NL3PRC<GY1BBS<HB1BBS
Sent: 200121/1224Z 5379@HB1BBS.ZL.NLD.EU BPQ6.0.19

Message from: HB1PMS@HB1BBS

FortiSIEM Suffers From Hardcoded SSH Key Vulnerability

January 21, 2020 | Malware and Vulnerabilities 
breach,data,identity,theft,broken,computer,lock,vulnerability,alert,antiviru
s,board,circuit,code,confidential,crime,cybercrime,decryption,defense,digita
l,firewall,hack,hacked,hacker,internet,log,monitor,network,open,padlock,pass
word,privacy,protect,protection,safe,searching,secrecy,secure,security,shiel
ding,software,spy,spyware,stealing,surveillance,technology,thief,threat,unlo
ck,unsecured,virus
The vulnerability could lead to a denial of service condition.
Fortinet has fixed the flaw in version 5.2.7 of FortiSIEM.
A security expert discovered a hard coded cryptographic key vulnerability in 
Fortinet’s Security Information and Event Management (FortiSIEM), which 
could be exploited by an attacker to get access to FortiSIEM Supervisor.

What happened?

Andrew Klaus, a security professional from Cybera, came across a hardcoded 
SSH public key in FortiSIEM. The vulnerability is tracked as CVE-2019-17659.

Klaus revealed that a hardcoded SSH key for the user 'tunneluser' was found 
to be shared across other Fortinet devices, and stored in plain text. As 
noted in the advisory published by Fortinet, the vulnerability could lead to 
the denial of service (DDoS).

"A use of hard-coded cryptographic key vulnerability in FortiSIEM may allow 
a remote unauthenticated attacker to obtain SSH access to the supervisor as 
the restricted user "tunneluser" by leveraging knowledge of the private key 
from another installation or a firmware image," read the advisory published 
by Fortinet.

Restricted user ‘tunneluser‘ runs in a restricted shell and lets only that 
user create tunnel connections from the supervisor to the originating IP 
address.

The timeline of the vulnerability

The flaw affects FortiSIEM version 5.2.6 and earlier versions. Below is the 
timeline of the vulnerability disclosure as per a thread on the Seclists 
forum.

Dec 2, 2019: Email sent to Fortinet PSIRT with vulnerability details.
Dec 3, 2019: Automated reply from PSIRT that email was received.
Dec 23, 2019: Sent a reminder email to PSIRT about requesting a human 
confirmation.
Jan 3, 2019: Public Release.
As per Klaus, no human response was received from Fortinet for over 30 days. 
However, Fortinet has now addressed the flaw with the release of FortiSIEM 
version 5.2.7.

Vulnerability workaround

Fortinet directed customers who aren’t using the reverse tunnel feature to 
disable SSH on port 19999 that only allows tunneluser to authenticate. 
Fortinet also advised customers to disable tunneluser SSH access on port 22.

73 Henk. HB1PMS

=====================================================================
  _    _ ____  __ ____  ____   _____ 
 | |  | |  _ \/_ |  _ \|  _ \ / ____|  SYS: Henk (hb1nos@hb1bbs.com)  
 | |__| | |_) || | |_) | |_) | (___    QTH: Ouwerkerk - JO11XO
 |  __  |  _ < | |  _ <|  _ < \___ \   BBS: HB1BBS.ZL.NLD.EU
 | |  | | |_) || | |_) | |_) |____) |  QRV: 27.235 MHz (FM 1200bps)
 |_|  |_|____/ |_|____/|____/|_____/   WEB: www.hb1bbs.com

=====================================================================
(Message sent with Sally 7.2.035)
---------------------------------------------------------------------
Timed Tuesday 11 January 2005  16:26 gmt
BBS       HB1PMS@HB1BBS
---------------------------------------------------------------------




Lese vorherige Mail | Lese naechste Mail


 14.11.2024 18:10:18lZurueck Nach oben