{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2020-12819","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2020-05-12T00:00:00.000Z","datePublished":"2024-12-19T07:40:58.144Z","dateUpdated":"2024-12-20T17:41:24.593Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiOS","cpes":["cpe:2.3:o:fortinet:fortios:6.4.1:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.2.3:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.2.2:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.9:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.12:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.11:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.10:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.9:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.8:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.7:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.6:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.5:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.4:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.3:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.2:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.1:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"6.4.0","lessThanOrEqual":"6.4.1","status":"affected"},{"versionType":"semver","version":"6.2.0","lessThanOrEqual":"6.2.4","status":"affected"},{"versionType":"semver","version":"6.0.0","lessThanOrEqual":"6.0.10","status":"affected"},{"versionType":"semver","version":"5.6.0","lessThanOrEqual":"5.6.12","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context"}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2024-12-19T07:40:58.144Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-122","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:X/RC:X"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiOS versions 5.6.13 or above. \r\nPlease upgrade to FortiOS versions 6.0.11 or above. \r\nPlease upgrade to FortiOS versions 6.2.5 or above. \r\nPlease upgrade to FortiOS versions 6.4.2 or above.\r\nWorkaround: \r\nDisable tunnel mode."}],"references":[{"name":"https://fortiguard.com/advisory/FG-IR-20-082","url":"https://fortiguard.com/advisory/FG-IR-20-082"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-20T16:45:10.916317Z","id":"CVE-2020-12819","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-20T17:41:24.593Z"}}]}}