vulnerability note CVE-2013-4669
Fortinet FortiClient: Man-in-the-middle attack
Synthesis of the vulnerability
An attacker can use a Man-in-the-middle attack, in order to capture the password of the Fortinet FortiClient VPN Client user.Impacted products:
BID-59604, CVE-2013-4669, VIGILANCE-VUL-12739.
Description of the vulnerability
The Fortinet FortiClient VPN Client product connects to the firewall, in order to establish a secured tunnel.
It checks the firewall X.509 certificate, to ensure it connects to the legitimate server. However, if the server changed, an error message is displayed, but it nevertheless sends user's login and password to the new server.
An attacker can therefore use a Man-in-the-middle attack, in order to capture the password of the Fortinet FortiClient VPN Client user.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides software vulnerability bulletins
. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system.