First published: Thu Feb 16 2023(Updated: )
A missing cryptographic steps vulnerability [CWE-325] in the functions that encrypt the DHCP and DNS keys (ddns-key or n-mhae-key) in FortiOS & FortiProxy configuration may allow an attacker in possession of the encrypted key to decipher it.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=1.1.0<=1.1.6 | |
Fortinet FortiProxy | >=1.2.0<=1.2.13 | |
Fortinet FortiProxy | >=2.0.0<=2.0.11 | |
Fortinet FortiProxy | >=7.0.0<7.0.8 | |
Fortinet FortiProxy | =7.2.0 | |
Fortinet FortiProxy | =7.2.1 | |
Fortinet FortiOS | >=6.0.0<=6.0.16 | |
Fortinet FortiOS | >=6.2.0<=6.2.12 | |
Fortinet FortiOS | >=6.4.0<=6.4.11 | |
Fortinet FortiOS | >=7.0.0<7.0.8 | |
Fortinet FortiOS | =7.2.0 |
Please upgrade to FortiOS version 7.2.1 or above Please upgrade to FortiOS version 7.0.8 or above Please upgrade to FortiProxy version 7.2.2 or above Please upgrade to FortiProxy version 7.0.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-29054.
The severity level of CVE-2022-29054 is low.
Fortinet FortiOS version 7.2.0, 7.0.0 through 7.0.5, 6.4.0 through 6.4.9, 6.2.x, and 6.0.x are affected by CVE-2022-29054.
The CWE category of CVE-2022-29054 is CWE-325 (Missing Cryptographic Step).
An attacker in possession of the encrypted key can decipher it to exploit CVE-2022-29054.