Description
A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiProxy version 7.4.3 or above Please upgrade to FortiOS version 7.4.4 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19368 | A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file. |
References
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-23-423 |
|
History
Thu, 01 May 2025 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 04 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortios Fortinet fortiproxy |
|
| CPEs | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortios Fortinet fortiproxy |
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-08-27T20:42:53.370Z
Reserved: 2024-01-02T10:15:00.526Z
Link: CVE-2024-21754
Updated: 2024-08-01T22:27:36.270Z
Status : Modified
Published: 2024-06-11T15:16:03.433
Modified: 2024-11-21T08:54:56.877
Link: CVE-2024-21754
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD