fortinet fortios CVE-2019-5591 is a vulnerability in Fortinet FortiOS
Published on August 14, 2020

A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.

NVD

Known Exploited Vulnerability

This Fortinet FortiOS Default Configuration Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.

The following remediation steps are recommended / required by May 3, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Missing Authentication for Critical Function

The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.


Products Associated with CVE-2019-5591

Want to know whenever a new CVE is published for Fortinet FortiOS? stack.watch will email you.

 

Affected Versions

Fortinet FortiOS Version FortiOS 6.2.0 and below. is affected by CVE-2019-5591

Exploit Probability

EPSS
48.36%
Percentile
97.70%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.