First published: Thu Feb 16 2023(Updated: )
A use of password hash with insufficient computational effort vulnerability [CWE-916] in FortiSandbox before 4.2.0 may allow an attacker with access to the password database to efficiently mount bulk guessing attacks to recover the passwords.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | =3.2.0 | |
Fortinet FortiSandbox | =3.2.1 | |
Fortinet FortiSandbox | =3.2.2 | |
Fortinet FortiSandbox | =3.2.3 | |
Fortinet FortiSandbox | =4.0.0 | |
Fortinet FortiSandbox | =4.0.1 | |
Fortinet FortiSandbox | =4.0.2 |
Upgrade to FortiSandbox version 4.2.0 and above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26115 is a vulnerability in FortiSandbox before 4.2.0 that allows an attacker with access to the password database to efficiently mount bulk guessing attacks to recover the passwords.
The severity of CVE-2022-26115 is high.
FortiSandbox versions 3.2.0, 3.2.1, 3.2.2, 3.2.3, 4.0.0, 4.0.1, and 4.0.2 are all affected by CVE-2022-26115.
An attacker with access to the password database can exploit CVE-2022-26115 by efficiently mounting bulk guessing attacks to recover the passwords.
You can find more information about CVE-2022-26115 at the FortiGuard Advisory FG-IR-20-220 on the FortiGuard website.