First published: Thu Feb 16 2023(Updated: )
An insufficiently protected credentials in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow a local attacker with database access to recover user passwords.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiNAC | >=8.5.0<=8.5.4 | |
Fortinet FortiNAC | >=8.6.0<=8.6.5 | |
Fortinet FortiNAC | >=8.7.0<=8.7.6 | |
Fortinet FortiNAC | >=8.8.0<=8.8.11 | |
Fortinet FortiNAC | >=9.1.0<=9.1.7 | |
Fortinet FortiNAC | >=9.2.0<=9.2.5 | |
Fortinet FortiNAC | =8.3.7 | |
Fortinet FortiNAC | =9.4.0 |
Please upgrade to FortiNAC-F version 7.2.0 or above Please upgrade to FortiNAC version 9.4.1 or above Please upgrade to FortiNAC version 9.2.6 or above Please upgrade to FortiNAC version 9.1.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40678 is classified as a vulnerability with a high severity due to its potential for local attackers to recover user passwords.
To fix CVE-2022-40678, you should upgrade Fortinet FortiNAC to a version that is not affected by this vulnerability.
CVE-2022-40678 affects FortiNAC versions 8.3.7 to 9.4.0, specifically 9.2.0 to 9.2.5, 9.1.0 to 9.1.7, 8.8.0 to 8.8.11, 8.7.0 to 8.7.6, 8.6.0 to 8.6.5, and 8.5.0 to 8.5.4.
CVE-2022-40678 can be exploited by local attackers who have access to the database.
CVE-2022-40678 is classified as an insufficiently protected credentials vulnerability.