cve-2017-14182
Vulnerability from cvelistv5
Published
2017-10-27 13:00
Modified
2024-10-25 14:11
Severity ?
EPSS score ?
Summary
A Denial of Service (DoS) vulnerability in Fortinet FortiOS 5.4.0 to 5.4.5 allows an authenticated user to cause the web GUI to be temporarily unresponsive, via passing a specially crafted payload to the 'params' parameter of the JSON web API.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html | Third Party Advisory | |
psirt@fortinet.com | http://www.securityfocus.com/bid/101559 | Third Party Advisory, VDB Entry | |
psirt@fortinet.com | http://www.securitytracker.com/id/1039678 | Third Party Advisory, VDB Entry | |
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-17-206 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101559 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039678 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-17-206 | Vendor Advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiOS |
Version: FortiOS 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T19:20:41.040Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html", }, { name: "1039678", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039678", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://fortiguard.com/psirt/FG-IR-17-206", }, { name: "101559", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101559", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-14182", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-23T14:00:32.114830Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T14:11:08.541Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Fortinet FortiOS", vendor: "Fortinet", versions: [ { status: "affected", version: "FortiOS 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0", }, ], }, ], datePublic: "2017-10-24T00:00:00", descriptions: [ { lang: "en", value: "A Denial of Service (DoS) vulnerability in Fortinet FortiOS 5.4.0 to 5.4.5 allows an authenticated user to cause the web GUI to be temporarily unresponsive, via passing a specially crafted payload to the 'params' parameter of the JSON web API.", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service (DoS)", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-30T14:57:01", orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", shortName: "fortinet", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html", }, { name: "1039678", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039678", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://fortiguard.com/psirt/FG-IR-17-206", }, { name: "101559", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101559", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@fortinet.com", ID: "CVE-2017-14182", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Fortinet FortiOS", version: { version_data: [ { version_value: "FortiOS 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0", }, ], }, }, ], }, vendor_name: "Fortinet", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A Denial of Service (DoS) vulnerability in Fortinet FortiOS 5.4.0 to 5.4.5 allows an authenticated user to cause the web GUI to be temporarily unresponsive, via passing a specially crafted payload to the 'params' parameter of the JSON web API.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service (DoS)", }, ], }, ], }, references: { reference_data: [ { name: "http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html", refsource: "MISC", url: "http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html", }, { name: "1039678", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039678", }, { name: "https://fortiguard.com/psirt/FG-IR-17-206", refsource: "CONFIRM", url: "https://fortiguard.com/psirt/FG-IR-17-206", }, { name: "101559", refsource: "BID", url: "http://www.securityfocus.com/bid/101559", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", assignerShortName: "fortinet", cveId: "CVE-2017-14182", datePublished: "2017-10-27T13:00:00", dateReserved: "2017-09-07T00:00:00", dateUpdated: "2024-10-25T14:11:08.541Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2017-14182\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2017-10-27T13:29:00.217\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Denial of Service (DoS) vulnerability in Fortinet FortiOS 5.4.0 to 5.4.5 allows an authenticated user to cause the web GUI to be temporarily unresponsive, via passing a specially crafted payload to the 'params' parameter of the JSON web API.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de denegación de servicio (DoS) en Fortinet FortiOS desde la versión 5.4.0 hasta la 5.4.5 permite que un usuario autenticado haga que la interfaz gráfica de usuario web no responda temporalmente, pasando una carga útil especialmente manipulada al parámetro \\\"params\\\" de la API web JSON.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:5.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1668AE14-D9A4-4B7D-BC3F-75885792875A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:5.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E0F3B9B-A06F-4A96-B2E7-9DC56E629182\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:5.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F8AE97-A647-4A37-8EF2-BC0BBCC8EADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:5.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"377A2F0B-2A58-4C2C-B546-3178B353484B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:5.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EBDFD4-45A0-47CC-817E-48E84F945402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:5.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9CDB2B-E454-4B91-9A47-615F31F1A3D5\"}]}]}],\"references\":[{\"url\":\"http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101559\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039678\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://fortiguard.com/psirt/FG-IR-17-206\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101559\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039678\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://fortiguard.com/psirt/FG-IR-17-206\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1039678\", \"name\": \"1039678\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"https://fortiguard.com/psirt/FG-IR-17-206\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/101559\", \"name\": \"101559\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T19:20:41.040Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-14182\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-23T14:00:32.114830Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-23T14:01:45.511Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Fortinet\", \"product\": \"Fortinet FortiOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"FortiOS 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0\"}]}], \"datePublic\": \"2017-10-24T00:00:00\", \"references\": [{\"url\": \"http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.securitytracker.com/id/1039678\", \"name\": \"1039678\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}, {\"url\": \"https://fortiguard.com/psirt/FG-IR-17-206\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/101559\", \"name\": \"101559\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A Denial of Service (DoS) vulnerability in Fortinet FortiOS 5.4.0 to 5.4.5 allows an authenticated user to cause the web GUI to be temporarily unresponsive, via passing a specially crafted payload to the 'params' parameter of the JSON web API.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Denial of Service (DoS)\"}]}], \"providerMetadata\": {\"orgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"shortName\": \"fortinet\", \"dateUpdated\": \"2017-10-30T14:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"FortiOS 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0\"}]}, \"product_name\": \"Fortinet FortiOS\"}]}, \"vendor_name\": \"Fortinet\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html\", \"name\": \"http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.securitytracker.com/id/1039678\", \"name\": \"1039678\", \"refsource\": \"SECTRACK\"}, {\"url\": \"https://fortiguard.com/psirt/FG-IR-17-206\", \"name\": \"https://fortiguard.com/psirt/FG-IR-17-206\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/101559\", \"name\": \"101559\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A Denial of Service (DoS) vulnerability in Fortinet FortiOS 5.4.0 to 5.4.5 allows an authenticated user to cause the web GUI to be temporarily unresponsive, via passing a specially crafted payload to the 'params' parameter of the JSON web API.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Denial of Service (DoS)\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-14182\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@fortinet.com\"}}}}", cveMetadata: "{\"cveId\": \"CVE-2017-14182\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-25T14:11:08.541Z\", \"dateReserved\": \"2017-09-07T00:00:00\", \"assignerOrgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"datePublished\": \"2017-10-27T13:00:00\", \"assignerShortName\": \"fortinet\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.