First published: Mon Mar 17 2025(Updated: )
A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSIEM Windows Agent |
Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. Workaround (for FortiSIEM version 5.2.6 and lower): Customers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999 by following the steps below : 1. SSH to the Supervisor node as the root user. 2. Remove tunneluser SSH configuration file to disable listening on port 19999: rm -f /etc/ssh/sshd_config.tunneluser echo rm -f /etc/ssh/sshd_config.tunneluser >> /etc/init.d/phProvision.sh 3. Then terminate sshd running on TCP Port 19999 as follows: pkill -f /usr/sbin/sshd -p 19999 4.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account: rm -f /opt/phoenix/deployment/id_rsa.pub.tunneluser rm -f /home/tunneluser/.ssh/authorized_keys rm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsa Customers are also advised to disable "tunneluser" SSH access on port 22 by following the steps bwlow: 1. SSH to the Supervisor node as the root user. 2. Add/edit the following line in sshd_config file: echo DenyUsers tunneluser >> /etc/ssh/sshd_config 3. service sshd restart
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17659 has a critical severity rating due to the potential for remote unauthorized SSH access.
To mitigate CVE-2019-17659, update FortiSIEM to the latest version that addresses this vulnerability.
Organizations using FortiSIEM version 5.2.6 are affected by CVE-2019-17659.
CVE-2019-17659 can be exploited by remote unauthenticated attackers gaining unauthorized SSH access.
The impact of CVE-2019-17659 includes unauthorized access to sensitive systems and potential data breaches.