Description
An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiGuest version 1.1.0 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-29545 | An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-052 |
|
History
Thu, 19 Sep 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-09-18T19:37:45.115Z
Reserved: 2023-02-08T13:42:03.366Z
Link: CVE-2023-25604
Updated: 2024-08-02T11:25:19.264Z
Status : Modified
Published: 2023-10-10T17:15:11.083
Modified: 2024-11-21T07:49:48.903
Link: CVE-2023-25604
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD