Description
A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiSIEM version 7.0.0 or above Please upgrade to FortiSIEM version 6.7.2 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-46919 | A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-259 |
|
History
Tue, 22 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-22T20:45:58.544Z
Reserved: 2022-10-27T07:40:06.589Z
Link: CVE-2022-43949
Updated: 2024-08-03T13:47:05.398Z
Status : Modified
Published: 2023-06-13T09:15:16.027
Modified: 2024-11-21T07:27:23.920
Link: CVE-2022-43949
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD