First published: Tue Jun 16 2020(Updated: )
Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | <=6.2.3 | |
Fortinet FortiManager | <=6.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-9289.
The title of this vulnerability is 'Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager'.
The affected software for this vulnerability is FortiManager 6.2.3 and below, FortiAnalyzer 6.2.3 and below.
The severity of CVE-2020-9289 is high with a CVSS score of 7.5.
Yes, you can find more information about CVE-2020-9289 vulnerability at 'https://fortiguard.com/psirt/FG-IR-19-007'.