First published: Mon Oct 19 2020(Updated: )
A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the "diag sys ha checksum show" command.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | <1.2.10 | |
Fortinet FortiProxy | =2.0.0 | |
Fortinet FortiOS | <6.0.12 | |
Fortinet FortiOS | >=6.2.0<6.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-6648.
The severity of CVE-2020-6648 is medium with a severity value of 6.5.
Fortinet FortiProxy versions up to 1.2.10, 2.0.0, and Fortinet FortiOS versions up to 6.0.12 and between 6.2.0 and 6.2.5 are affected by CVE-2020-6648.
An authenticated attacker can exploit CVE-2020-6648 by connecting to the FortiGate CLI and executing specific commands to obtain sensitive information.
Yes, you can find references for CVE-2020-6648 at the following links: [Reference 1] [Reference 2].