First published: Thu Jan 23 2020(Updated: )
Improper permission or value checking in the CLI console may allow a non-privileged user to obtain Fortinet FortiOS plaint text private keys of system's builtin local certificates via unsetting the keys encryption password in FortiOS 6.2.0, 6.0.0 to 6.0.6, 5.6.10 and below or for user uploaded local certificates via setting an empty password in FortiOS 6.2.1, 6.2.0, 6.0.6 and below.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | <=5.6.10 | |
Fortinet FortiOS | >=6.0.0<=6.0.6 | |
Fortinet FortiOS | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5593 has a severity rating classified as critical due to the potential exposure of private keys.
To mitigate CVE-2019-5593, ensure that you upgrade FortiOS to a version above 6.2.0, 6.0.6, and 5.6.10.
The vulnerability allows unauthorized users to access plaintext private keys, which can compromise the security of the system.
CVE-2019-5593 affects users of FortiOS versions 5.6.10 and below, as well as specific versions between 6.0.0 and 6.0.6, and 6.2.0.
While the best solution is to upgrade to a patched version, users may also restrict access to the CLI console as a temporary measure.