The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability note CVE-2013-4669

Fortinet FortiClient: Man-in-the-middle attack

Synthesis of the vulnerability

An attacker can use a Man-in-the-middle attack, in order to capture the password of the Fortinet FortiClient VPN Client user.
Impacted products: FortiClient.
Severity: 2/4.
Creation date: 02/05/2013.
Identifiers: BID-59604, CVE-2013-4669, VIGILANCE-VUL-12739.

Description of the vulnerability

The Fortinet FortiClient VPN Client product connects to the firewall, in order to establish a secured tunnel.

It checks the firewall X.509 certificate, to ensure it connects to the legitimate server. However, if the server changed, an error message is displayed, but it nevertheless sends user's login and password to the new server.

An attacker can therefore use a Man-in-the-middle attack, in order to capture the password of the Fortinet FortiClient VPN Client user.
Complete Vigil@nce bulletin.... (free trial)

Computer vulnerabilities tracking service

Vigil@nce provides software vulnerability bulletins. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system.