Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-10925 | Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-20-049 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:57:36.414Z
Reserved: 2021-01-13T00:00:00
Link: CVE-2021-24005

No data.

Status : Modified
Published: 2021-07-06T11:15:08.560
Modified: 2024-11-21T05:52:11.520
Link: CVE-2021-24005

No data.

No data.