First published: Mon Apr 12 2021(Updated: )
A clear text storage of sensitive information into log file vulnerability in FortiADCManager 5.3.0 and below, 5.2.1 and below and FortiADC 5.3.7 and below may allow a remote authenticated attacker to read other local users' password in log files.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | <=5.3.7 | |
Fortinet Fortiadc Manager | <=5.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-24024.
The vulnerability allows a remote authenticated attacker to read other local users' passwords stored in log files.
FortiADCManager 5.3.0 and below, 5.2.1 and below, and FortiADC 5.3.7 and below are affected.
The severity of CVE-2021-24024 is medium.
It is recommended to upgrade FortiADCManager and FortiADC to versions that have addressed the vulnerability.