Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded key.
References
History

Fri, 25 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2020-06-04T12:27:29

Updated: 2024-10-25T14:01:30.678Z

Reserved: 2019-09-09T00:00:00

Link: CVE-2019-16150

cve-icon Vulnrichment

Updated: 2024-08-05T01:10:41.069Z

cve-icon NVD

Status : Modified

Published: 2020-06-04T13:15:10.757

Modified: 2024-11-21T04:30:09.220

Link: CVE-2019-16150

cve-icon Redhat

No data.