First published: Thu Nov 21 2019(Updated: )
Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | <=5.6.10 | |
Fortinet FortiOS | >=6.0.0<=6.0.6 | |
Fortinet FortiOS | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6693 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2019-6693, upgrade FortiOS to version 5.6.11 or later, or 6.0.7 or later.
The potential impact of CVE-2019-6693 includes unauthorized access to sensitive data such as user passwords in configuration backup files.
CVE-2019-6693 affects FortiOS versions 5.6.10 and earlier, 6.0.6 and earlier, and specifically 6.2.0.
No official workaround has been provided for CVE-2019-6693; updating to a patched version is recommended.