First published: Tue Sep 06 2022(Updated: )
A missing cryptographic steps vulnerability [CWE-325] in the functions that encrypt keytab values in FortiOS & FortiProxy may allow an attacker in possession of the encrypted secret to decipher it.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=6.0.0<=6.0.14 | |
Fortinet FortiOS | >=6.2.0<=6.2.11 | |
Fortinet FortiOS | >=6.4.0<=6.4.9 | |
Fortinet FortiOS | >=7.0.0<7.0.6 | |
Fortinet FortiOS | =7.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-29053 is classified as high due to its potential to allow an attacker to decipher encrypted keytab values.
To fix CVE-2022-29053, users should upgrade to the latest version of FortiOS or apply any patches provided by Fortinet.
CVE-2022-29053 affects multiple versions of FortiOS including versions 6.0.0 to 6.0.14, 6.2.0 to 6.2.11, 6.4.0 to 6.4.9, and 7.0.0 to 7.0.6.
Yes, CVE-2022-29053 can potentially lead to unauthorized access if an attacker successfully deciphers the encrypted keytab values.
CVE-2022-29053 is a missing cryptographic steps vulnerability, specifically classified under CWE-325.