First published: Tue Jun 13 2023(Updated: )
A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSIEM | >=5.3.0<=5.3.3 | |
Fortinet FortiSIEM | >=6.3.0<=6.3.3 | |
Fortinet FortiSIEM | >=6.6.0<=6.6.3 | |
Fortinet FortiSIEM | =5.4.0 | |
Fortinet FortiSIEM | =6.1.0 | |
Fortinet FortiSIEM | =6.1.1 | |
Fortinet FortiSIEM | =6.1.2 | |
Fortinet FortiSIEM | =6.2.0 | |
Fortinet FortiSIEM | =6.2.1 | |
Fortinet FortiSIEM | =6.4.0 | |
Fortinet FortiSIEM | =6.4.1 | |
Fortinet FortiSIEM | =6.4.2 | |
Fortinet FortiSIEM | =6.5.0 | |
Fortinet FortiSIEM | =6.5.1 | |
Fortinet FortiSIEM | =6.7.0 | |
Fortinet FortiSIEM | =6.7.1 |
Please upgrade to FortiSIEM version 7.0.0 or above Please upgrade to FortiSIEM version 6.7.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43949 is a vulnerability that allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints in Fortinet FortiSIEM before version 6.7.1.
CVE-2022-43949 has a severity score of 7.5 (high).
Fortinet FortiSIEM versions 5.3.0 to 5.3.3, 6.3.0 to 6.3.3, and 6.6.0 to 6.6.3 are affected by CVE-2022-43949.
To fix CVE-2022-43949, upgrade your Fortinet FortiSIEM software to version 6.7.1 or later.
You can find more information about CVE-2022-43949 on the Fortinet FortiGuard website: https://fortiguard.com/psirt/FG-IR-22-259