An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs.
Fixes

Solution

Please upgrade to FortiGuest version 1.1.0 or above


Workaround

No workaround given by the vendor.

References
History

Thu, 19 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-09-18T19:37:45.115Z

Reserved: 2023-02-08T13:42:03.366Z

Link: CVE-2023-25604

cve-icon Vulnrichment

Updated: 2024-08-02T11:25:19.264Z

cve-icon NVD

Status : Modified

Published: 2023-10-10T17:15:11.083

Modified: 2024-11-21T07:49:48.903

Link: CVE-2023-25604

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.