Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-6589 | A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image. |
Solution
Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. Workaround (for FortiSIEM version 5.2.6 and lower): Customers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999 by following the steps below : 1. SSH to the Supervisor node as the root user. 2. Remove tunneluser SSH configuration file to disable listening on port 19999: rm -f /etc/ssh/sshd_config.tunneluser echo rm -f /etc/ssh/sshd_config.tunneluser >> /etc/init.d/phProvision.sh 3. Then terminate sshd running on TCP Port 19999 as follows: pkill -f /usr/sbin/sshd -p 19999 4.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account: rm -f /opt/phoenix/deployment/id_rsa.pub.tunneluser rm -f /home/tunneluser/.ssh/authorized_keys rm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsa Customers are also advised to disable "tunneluser" SSH access on port 22 by following the steps bwlow: 1. SSH to the Supervisor node as the root user. 2. Add/edit the following line in sshd_config file: echo DenyUsers tunneluser >> /etc/ssh/sshd_config 3. service sshd restart
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-19-296 |
![]() ![]() |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortisiem |
|
CPEs | cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet fortisiem |
Mon, 17 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 17 Mar 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image. | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-17T13:35:08.816Z
Reserved: 2019-10-16T00:00:00.000Z
Link: CVE-2019-17659

Updated: 2025-03-17T13:35:04.552Z

Status : Analyzed
Published: 2025-03-17T14:15:16.360
Modified: 2025-07-15T16:48:48.100
Link: CVE-2019-17659

No data.

Updated: 2025-07-12T22:32:00Z