Description
Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key.
Published: 2020-06-16
Score: 7.5 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-30115 Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key.
References
History

Fri, 25 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Fortinet Fortianalyzer Fortimanager
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-10-25T14:25:10.790Z

Reserved: 2020-02-19T00:00:00.000Z

Link: CVE-2020-9289

cve-icon Vulnrichment

Updated: 2024-08-04T10:26:16.066Z

cve-icon NVD

Status : Modified

Published: 2020-06-16T21:15:11.470

Modified: 2024-11-21T05:40:21.903

Link: CVE-2020-9289

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses