First published: Tue Nov 02 2021(Updated: )
A cleartext storage of sensitive information in GUI in FortiADC versions 5.4.3 and below, 6.0.0 and below may allow a remote authenticated attacker to retrieve some sensitive information such as users LDAP passwords and RADIUS shared secret by deobfuscating the passwords entry fields.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=5.0.0<=5.4.3 | |
Fortinet FortiADC | >=6.0.0<=6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-15935.
The severity of CVE-2020-15935 is medium with a CVSS score of 4.3.
FortiADC versions 5.4.3 and below, 6.0.0 and below are affected.
A remote authenticated attacker can exploit CVE-2020-15935 by deobfuscating the passwords entry fields in the GUI and retrieving sensitive information such as LDAP passwords and RADIUS shared secret.
Yes, Fortinet has released a fix for CVE-2020-15935. It is recommended to update to a version that is not affected.