An Insufficient Entropy in PRNG vulnerability in Fortinet FortiOS 6.2.1, 6.2.0, 6.0.8 and below for device not enable hardware TRNG token and models not support builtin TRNG seed allows attacker to theoretically recover the long term ECDSA secret in a TLS client with a RSA handshake and mutual ECDSA authentication via the help of flush+reload side channel attacks in FortiGate VM models only.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-19-186 |
History
Fri, 25 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2019-10-24T13:53:17
Updated: 2024-10-25T14:28:18.828Z
Reserved: 2019-08-27T00:00:00
Link: CVE-2019-15703
Vulnrichment
Updated: 2024-08-05T00:56:22.456Z
NVD
Status : Modified
Published: 2019-10-24T14:15:11.003
Modified: 2024-11-21T04:29:17.510
Link: CVE-2019-15703
Redhat
No data.