First published: Thu Jun 04 2020(Updated: )
Use of a hard-coded cryptographic key to encrypt security sensitive data in local storage and configuration in FortiClient for Windows prior to 6.4.0 may allow an attacker with access to the local storage or the configuration backup file to decrypt the sensitive data via knowledge of the hard-coded key.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Windows | <6.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-16150.
The severity of CVE-2019-16150 is medium with a severity value of 5.5.
The affected software for CVE-2019-16150 is Fortinet FortiClient for Windows prior to version 6.4.0.
CVE-2019-16150 allows an attacker with access to the local storage or the configuration backup file to decrypt security sensitive data using a hard-coded cryptographic key.
Yes, the fix for CVE-2019-16150 is to update FortiClient for Windows to version 6.4.0 or newer.