Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-31991 | A exposure of sensitive information to an unauthorized actor in Fortinet FortiManager version 6.0.0 through 6.0.4, FortiAnalyzer version 6.0.0 through 6.0.4, FortiPortal version 6.0.0 through 6.0.9, 5.3.0 through 5.3.8, 5.2.x, 5.1.0, 5.0.x, 4.2.x, 4.1.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.x, 6.0.x allows an attacker which has obtained access to a restricted administrative account to obtain sensitive information via `diagnose debug` commands. |
Solution
Upgrade to FortiManager version 6.0.5 and above, Upgrade to FortiManager version 6.2.0 and above. Upgrade to FortiAnalyzer version 6.0.5 and above, Upgrade to FortiAnalyzer version 6.2.0 and above. Upgrade to FortiPortal version 6.0.10 and above. Upgrade to FortiSwitch version 6.4.11 and above, Upgrade to FortiSwitch version 7.0.5 and above.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-18-232 |
|
Tue, 22 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-22T20:48:18.405Z
Reserved: 2022-03-21T16:03:48.576Z
Link: CVE-2022-27490
Updated: 2024-08-03T05:32:57.808Z
Status : Modified
Published: 2023-03-07T17:15:11.793
Modified: 2024-11-21T06:55:49.757
Link: CVE-2022-27490
No data.
OpenCVE Enrichment
No data.
EUVD