Zero-day vulnerability in FortiOS

Buffer overflow

Information about zero-day vulnerabilities in Cisco and FortiOS products was exposed after NSA data leak in August 2016. The tools bear digital signatures that match those used by the Equation Group, a group that has alleged links to the NSA. The incident highlights the risk of hoarding zero-day vulnerabilities.

EGREGIOUSBLUNDER is one of multiple Equation Group vulnerabilities and exploits disclosed on 2016/08/14 by a group known as the Shadow Brokers.

Vulnerability details

Advisory: SB2016081401 - Remote code execution in Fortinet FortiOS and FortiSwitch

Vulnerable component: FortiOS

CVE-ID: CVE-2016-6909

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer


The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exist due to a boundary error within cookie parser. A remote attacker can send a specially crafted HTTP request, cause memory corruption and execute arbitrary code on vulnerable system.

Successful exploitation of the vulnerability may allow an attacker to gain unauthorized access to vulnerable system.

Note:the vulnerability was being actively exploited.

Public Exploits: