First published: Tue Jul 06 2021(Updated: )
Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAuthenticator | >=6.0.0<6.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-24005.
The title of the vulnerability is 'Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator'.
The vulnerability involves the usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0, which may allow an attacker to decrypt sensitive data if they have access to the files or the CLI configuration and knowledge of the hard-coded key.
FortiAuthenticator versions before 6.3.0 are affected by this vulnerability.
The severity of CVE-2021-24005 is high with a severity value of 7.5.
An attacker with access to the encrypted files or the CLI configuration and knowledge of the hard-coded key can exploit this vulnerability to decrypt sensitive data.
To fix the vulnerability, it is recommended to upgrade FortiAuthenticator to version 6.3.0 or later.
You can find more information about CVE-2021-24005 at the following link: [FortiGuard Advisory FG-IR-20-049](https://fortiguard.com/psirt/FG-IR-20-049).