Fixed: CVE-2019-5591 - FortiOS - Man-in-the-Middle #13436 #13438
+224
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixed: CVE-2019-5591 - FortiOS - Man-in-the-Middle #13436
This pull request adds a comprehensive Nuclei template for CVE-2019-5591, a medium-severity default configuration vulnerability in FortiOS that allows for Man-in-the-Middle attacks on LDAP traffic.
This vulnerability is listed on CISA's Known Exploited Vulnerabilities (KEV) catalog and has been actively exploited by threat actors in ransomware campaigns, making its detection critical for organizations.
The template uses a multi-stage detection method, first fingerprinting a FortiOS device via its login page and then querying a legitimate API endpoint (
/api/v2/monitor/system/status
) to confirm the vulnerable version. This approach ensures high accuracy and avoids false positives.https://www.fortiguard.com/psirt/FG-IR-19-037
https://nvd.nist.gov/vuln/detail/CVE-2019-5591
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
(KEV Entry)https://www.tenable.com/blog/frequently-asked-questions-about-iranian-cyber-operations
(Threat Actor Exploitation)/claim #13436
/attempt #13436
Template Validation
I've validated this template locally?
Additional Details (leave it blank if not applicable)
cpe:"cpe:2.3:o:fortinet:fortios"
orhttp.favicon.hash:945408572
app="FORTINET-FortiGate"
oricon_hash=945408572
intitle:"FortiGate"
HTTP Matched Response Data Snippet:
The template triggers upon identifying a vulnerable version from the
/api/v2/monitor/system/status
endpoint.