Description
Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-30115 | Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-19-007 |
|
History
Fri, 25 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T14:25:10.790Z
Reserved: 2020-02-19T00:00:00.000Z
Link: CVE-2020-9289
Updated: 2024-08-04T10:26:16.066Z
Status : Modified
Published: 2020-06-16T21:15:11.470
Modified: 2024-11-21T05:40:21.903
Link: CVE-2020-9289
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD