Learn about CVE-2019-5592 affecting Fortinet IPS Engine versions 5.000 to 5.006, 4.000 to 4.036, 4.200 to 4.219, and 3.547 and below. Discover the impact, affected systems, exploitation, and mitigation steps.
Fortinet IPS Engine versions 5.000 to 5.006, 4.000 to 4.036, 4.200 to 4.219, and 3.547 and below are vulnerable to multiple padding oracle attacks, including Zombie POODLE, GOLDENDOODLE, and OpenSSL 0-length, potentially leading to information disclosure.
Understanding CVE-2019-5592
The vulnerability in Fortinet IPS Engine exposes systems to decryption of TLS connections by attackers in a Man-in-the-middle position.
What is CVE-2019-5592?
The FortiOS IPS engine versions 5.000 to 5.006, 4.000 to 4.036, 4.200 to 4.219, and 3.547 and below are susceptible to padding oracle vulnerabilities, allowing attackers to decrypt TLS connections.
The Impact of CVE-2019-5592
Exploiting these vulnerabilities can result in unauthorized decryption of network traffic passing through FortiGate, potentially leading to information disclosure.
Technical Details of CVE-2019-5592
Fortinet IPS Engine vulnerability details and affected systems.
Vulnerability Description
The vulnerability lies in the CBC padding implementation of FortiOS IPS engine versions, enabling attackers to decipher TLS connections when SSL Deep Inspection policies are active.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit the vulnerabilities when SSL Deep Inspection policies are enabled, and the IPS sensor is active, allowing decryption of TLS connections.
Mitigation and Prevention
Protecting systems from CVE-2019-5592.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates