Description
A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.4, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.4, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to retrieve passwords for multiple installed connectors via server address modification in connector configuration.
Published: 2026-04-14
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Credential Theft
Action: Immediate Patch
AI Analysis

Impact

A storing passwords in a recoverable format vulnerability in FortiSOAR allows a remote attacker who authenticates to the system to modify connector configuration. This action creates stored passwords in a recoverable format, so the attacker can retrieve the plaintext credentials for multiple installed connectors. The flaw is a password storage weakness that can expose sensitive authentication information.

Affected Systems

Fortinet FortiSOAR PaaS versions 7.6.0 through 7.6.4, 7.5.0 through 7.5.2, all 7.4 releases, and all 7.3 releases are affected. Fortinet FortiSOAR on‑premise versions 7.6.0 through 7.6.4, 7.5.0 through 7.5.2, all 7.4 releases, and all 7.3 releases are also impacted. Both cloud‑based PaaS and on‑premise deployments are vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 4.1, indicating moderate severity. EPSS data is not available, so the likelihood of exploitation in the wild is not quantified. Because exploitation requires an authenticated session with permission to modify connector configuration, an attacker must have privileged access. The flaw is not listed in CISA’s KEV catalog, suggesting that widespread exploitation has not been reported yet.

Generated by OpenCVE AI on April 14, 2026 at 18:55 UTC.

Remediation

Vendor Solution

Upgrade to FortiSOAR on-premise version 7.6.5 or above Upgrade to upcoming FortiSOAR on-premise version 7.5.3 or above Upgrade to FortiSOAR PaaS version 7.6.5 or above Upgrade to upcoming FortiSOAR PaaS version 7.5.3 or above


OpenCVE Recommended Actions

  • Upgrade FortiSOAR on‑premise to version 7.6.5 or later, or to the upcoming 7.5.3 or later release.
  • Upgrade FortiSOAR PaaS to version 7.6.5 or later, or to the upcoming 7.5.3 or later release.
  • Verify that only privileged administrators can modify connector configurations.
  • Audit stored connector passwords to assess potential exposure.
  • Apply least‑privilege access controls to configuration management interfaces.
  • Check the vendor’s website for additional updates if a patch is not yet available.

Generated by OpenCVE AI on April 14, 2026 at 18:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title FortiSOAR Connector Passwords Stored in Recoverable Format

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.4, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.4, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to retrieve passwords for multiple installed connectors via server address modification in connector configuration.
First Time appeared Fortinet
Fortinet fortisoaron-premise
Fortinet fortisoarpaas
Weaknesses CWE-257
CPEs cpe:2.3:a:fortinet:fortisoaron-premise:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoaron-premise:7.6.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.5.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisoarpaas:7.6.4:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisoaron-premise
Fortinet fortisoarpaas
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C'}


Subscriptions

Fortinet Fortisoaron-premise Fortisoarpaas
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-04-14T16:46:17.327Z

Reserved: 2026-01-07T18:30:44.883Z

Link: CVE-2026-22576

cve-icon Vulnrichment

Updated: 2026-04-14T16:37:34.812Z

cve-icon NVD

Status : Received

Published: 2026-04-14T16:16:36.937

Modified: 2026-04-14T16:16:36.937

Link: CVE-2026-22576

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:30:06Z

Weaknesses