First published: Wed Nov 02 2022(Updated: )
A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSIEM | >=5.1.0<=5.1.3 | |
Fortinet FortiSIEM | >=5.2.5<=5.2.8 | |
Fortinet FortiSIEM | >=5.3.0<=5.3.3 | |
Fortinet FortiSIEM | >=6.1.0<=6.1.2 | |
Fortinet FortiSIEM | >=6.3.0<=6.3.3 | |
Fortinet FortiSIEM | =5.0.0 | |
Fortinet FortiSIEM | =5.0.1 | |
Fortinet FortiSIEM | =5.2.1 | |
Fortinet FortiSIEM | =5.2.2 | |
Fortinet FortiSIEM | =5.4.0 | |
Fortinet FortiSIEM | =6.2.0 | |
Fortinet FortiSIEM | =6.2.1 | |
Fortinet FortiSIEM | =6.4.0 | |
Fortinet FortiSIEM | =6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Fortinet FortiSIEM vulnerability is CVE-2022-26119.
CVE-2022-26119 has a severity value of 7.8, which is considered high.
Fortinet FortiSIEM versions 5.1.0 to 5.1.3, 5.2.5 to 5.2.8, 5.3.0 to 5.3.3, 6.1.0 to 6.1.2, and 6.3.0 to 6.3.3 are affected by CVE-2022-26119.
A local attacker with CLI access can exploit CVE-2022-26119 by performing operations on the Glassfish server directly using a hardcoded password.
More information about CVE-2022-26119 can be found at the following link: https://fortiguard.com/psirt/FG-IR-22-064