Vulnerability Details : CVE-2019-6143
Forcepoint Next Generation Firewall (Forcepoint NGFW) 6.4.x before 6.4.7, 6.5.x before 6.5.4, and 6.6.x before 6.6.2 has a serious authentication vulnerability that potentially allows unauthorized users to bypass password authentication and access services protected by the NGFW Engine. The vulnerability affects the following NGFW features when the LDAP authentication method is used as the backend authentication: IPsec VPN, SSL VPN or Browser-based user authentication. The vulnerability does not apply when any other backend authentication is used. The RADIUS authentication method is not vulnerable, for example.
Vulnerability category: BypassGain privilege
Products affected by CVE-2019-6143
- cpe:2.3:a:forcepoint:next_generation_firewall:*:*:*:*:*:*:*:*
- cpe:2.3:a:forcepoint:next_generation_firewall:*:*:*:*:*:*:*:*
- cpe:2.3:a:forcepoint:next_generation_firewall:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-6143
0.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-6143
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST | |
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2019-6143
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-6143
-
https://help.forcepoint.com/security/CVE/CVE-2019-6143.html
Vendor Advisory
Jump to