An Insufficient Entropy in PRNG vulnerability in Fortinet FortiOS 6.2.1, 6.2.0, 6.0.8 and below for device not enable hardware TRNG token and models not support builtin TRNG seed allows attacker to theoretically recover the long term ECDSA secret in a TLS client with a RSA handshake and mutual ECDSA authentication via the help of flush+reload side channel attacks in FortiGate VM models only.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-19-186 |
![]() ![]() |
History
Fri, 25 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published: 2019-10-24T13:53:17
Updated: 2024-10-25T14:28:18.828Z
Reserved: 2019-08-27T00:00:00
Link: CVE-2019-15703

Updated: 2024-08-05T00:56:22.456Z

Status : Modified
Published: 2019-10-24T14:15:11.003
Modified: 2024-11-21T04:29:17.510
Link: CVE-2019-15703

No data.