Technical Articles
F5 SMEs share good practice.
cancel
Showing results for 
Search instead for 
Did you mean: 
Gal_Goldshtein
F5 Employee
F5 Employee

Recently an unauthenticated arbitrary file read vulnerability was discovered in Fortinet VPN service. The vulnerability allows an unauthenticated remote attacker to send a specially crafted request in order to read an arbitrary file from the vulnerable server file system. The vulnerability affects the following FortiOS versions:

  • 5.6.3 to 5.6.7
  • 6.0.0 to 6.0.4


Exploits targeting this vulnerability were posted online a few days ago and researchers at F5 Networks have already detected threat campaigns targeting this vulnerability.


Mitigation with BIG-IP ASM

ASM customers under any supported BIG-IP version are already protected against this vulnerability as the exploitation attempt will be detected by existing “Path traversal” signatures.


0151T000003kuNcQAI.png

Figure 1: Exploit blocked with Attack Signature (200000190)


0151T000003kuNXQAY.png

Figure 2: Exploit blocked with Attack Signature (200101550)

Comments
miladmin
Nimbostratus
Nimbostratus

hi Gal

thanks for this topic

Version history
Last update:
‎27-Aug-2019 08:04
Updated by:
Contributors