Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6693 PoC — Fortinet FortiOS 信任管理问题漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 信任管理问题漏洞 (CVE-2019-6693)
Description:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS 5.6.10及之前版本、6.0.6及之前版本和6.2.0版本中存在安全漏洞,该漏洞源于程序使用硬编码加密密钥来加密配置备份文件中的敏感信息。攻击者可利用该漏洞访问备份文件,解密敏感数据。
Description
Decrypt FortiGate configuration secrets
Readme
# CVE-2019-6693
Decrypt FortiGate configuration secrets

[Original advisory](https://medium.com/@bart.dopheide/decrypting-fortigate-passwords-cve-2019-6693-1239f6fd5a61)
[Vendor advisory](https://www.fortiguard.com/psirt/FG-IR-19-007)

For Fortigate VM/appliances below versions 6.2.0, 6.0.0 to 6.0.6, 5.6.10 configuration secrets are stored encrypted with a unique key.
For versions above the non-default ```private-data-encryption``` parameter lets the user use a custom key. This is rarely used, even today.

This [script](./fortigate_decrypt.py) decrypts secrets from dumped configurations.
File Snapshot

[4.0K] /data/pocs/428480c938118932bb1b0757955325cb8f84d264 ├── [ 316] fortigate_decrypt.py └── [ 595] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.