First published: Thu Feb 16 2023(Updated: )
A clear text storage of sensitive information (CWE-312) vulnerability in both FortiGate and FortiAuthenticator may allow a local unauthorized party to retrieve the Fortinet private keys used to establish secure communication with both Apple Push Notification and Google Cloud Messaging services, via accessing the files on the filesystem. The potentially exposed private keys have been revoked, please upgrade to the versions provided in the solutions to support push proxy.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAuthenticator | >=6.0.0<=6.0.4 | |
Fortinet FortiAuthenticator | =5.5.0 | |
Fortinet FortiAuthenticator | =6.1.0 | |
Fortinet FortiOS | >=6.0.0<=6.0.13 | |
Fortinet FortiOS | >=6.2.0<=6.2.9 | |
Fortinet FortiOS | =6.4.0 | |
Fortinet FortiOS | =6.4.1 |
Please upgrade to FortiGate version 6.4.2 or above. Please upgrade to FortiOS version 6.2.10 or above Please upgrade to FortiOS version 6.0.14 or above Please upgrade to FortiAuthenticator version 6.2.0 or above Please upgrade to FortiAuthenticator version 6.1.1 or above Please upgrade to FortiAuthenticator version 6.0.5 or above Workaround in FortiOS: Disable the FTM push service by using the below commands: config system ftm-push set status disable end
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-22302.
CVE-2022-22302 has a severity rating of medium.
CVE-2022-22302 affects FortiGate versions 6.4.0 through 6.4.1, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13, as well as FortiAuthenticator version 5.5.0 and all versions of 6.1 and 6.0.
The CWE ID for this vulnerability is CWE-312.
A local unauthorized party may exploit CVE-2022-22302 to retrieve the Fortinet private information stored in clear text.