The Internet Key Exchange version 1 (IKEv1) implementations in Fortinet FortiOS 2.50, 2.80 and 3.0, FortiClient 2.0,; and FortiManager 2.80 and 3.0 allow remote attackers to cause a denial of service (termination of a process that is automatically restarted) via IKE packets with invalid values of certain IPSec attributes, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the vendor advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.
2005-12-29T11:03:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.8 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | fortinet | fortios | 2.50 | No |
Operating System | fortinet | fortios | 2.80 | No |
Operating System | fortinet | fortios | 3.0 | No |
Hardware | fortinet | forticlient | 2.0 | No |
Hardware | fortinet | fortimanager | 2.80 | No |
Hardware | fortinet | fortimanager | 3.0 | No |