Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Fortinet unhappy with tests showing firewall flaw

Claims IPS and AV should have been turned on

Article comments

Security vendor Fortinet has hit back against tests by NSS Labs that showed one of its high-end firewalls along with products from other vendors could be hacked using a ‘TCP split handshake attack’.

According to a statement put out by Fortinet, its Fortigate-3950B was only vulnerable to this attack if used independently of the Intrusion Prevention System (IPS) and anti-virus modules, which by implication would be the company’s recommended configuration.

Furthermore, Fortinet said, the company had developed IPS signatures to block this type of attack and would also modify its firewall functionality to do the same.

Six vendors were assessed by NSS Labs – Fortinet, SonicWall, Palo Alto Networks, Juniper, Cisco and Check Point - which got hold of the kit from companies using the equipment rather than the vendors themselves. This overcomes the valid criticism that many equipment tests are not independent because the participating companies pay for them to be conducted.

 Only one product out of six resisted the potentially serious TCP handshake spoofing attack, Check Point’s Power-1 11065.

“We feel strongly that integrated protection is the best approach for blocking this issue, as customers that have IPS working with their firewall are better protected against a wider range of threats. The majority of Fortinet’s customers are using integrated firewall and IPS, as well as other security feature,” said Fortinet VP of product marketing, Patrick Bedwell.

“The IPS signature is a short-term work around to the split handshake, and provides immediate protection against this issue. Customers can enable a single IPS signature if they are not currently running the IPS feature that is included in the FortiGate consolidated security platform,” he added.

Does the company’s reasoning hold any water?

Fortinet has some justification in pointing out that many customers buy its firewalls to use at multi-module Unified Threat Management (UTM) appliances and so would almost certainly have more than one module turned on at once. Fortinet counts as a pioneer of this multi-purpose model of security.

On the other hand, that the firewall component of a system is vulnerable in five out of six vendors’ systems tested is damning. Would the issue have been discovered or at least disclosed had NSS labs not conducted its tests independently of the vendors? Almost certainly not. Certainly the security of one element of a UTM should not be dependent on the use of other modules at the same time.

Fortinet said it planned a firmware update for the FortiOS UTM operating system for later this year.

In an email sent to Techworld, NSS Labs chief Rick Moy defended the report's original conclusions regarding the vulnerability.

"Claims that IPS or AV can stop a TCP split handshake attack are not accurate. Those are workarounds for trying to find malicious activity after the intruder has already gained access inside the firewall. It's like saying a metal detector will catch somebody who stole an employee ID card to get in the building,” said Moy.

Separately, SonicWall issued a statement rejecting NSS Labs' assessment of its own product, the NSA E8500, looked at in the tests.

"This claim [the TCP split handshake attack vulnerability] is not correct since SonicOS has had the referenced TCP Split Handshake Spoof protection since SonicOS 3.0 released in 2004. Regrettably, NSS chose not to enable it for their testing despite our insistence on it being enabled for proper results," claimed company PR director, Jock Breitwieser.



Share:

More from Techworld

More relevant IT news

Comments

Noone said: NSS just trying to grab headlines imho All of the vendors have had a way to block this for years Why slam everyone but then say Checkpoint is great because it enables it by default NSS also just released a glowing report on Checkpoint before this I makes me think hmmm why

Catz said: Why isnt it enabled by default i have just enabled it in mineThis claim the TCP split handshake attack vulnerability is not correct since SonicOS has had the referenced TCP Split Handshake Spoof protection since SonicOS 30 released in 2004 Regrettably NSS chose not to enable it for their testing despite our insistence on it being enabled for proper results claimed company PR director Jock Breitwieser



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *