Description
An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs.
Published: 2023-10-10
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please upgrade to FortiGuest version 1.1.0 or above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-29545 An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs.
References
History

Thu, 19 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Fortinet Fortiguest
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-09-18T19:37:45.115Z

Reserved: 2023-02-08T13:42:03.366Z

Link: CVE-2023-25604

cve-icon Vulnrichment

Updated: 2024-08-02T11:25:19.264Z

cve-icon NVD

Status : Modified

Published: 2023-10-10T17:15:11.083

Modified: 2024-11-21T07:49:48.903

Link: CVE-2023-25604

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses