First published: Wed May 03 2023(Updated: )
An insufficiently protected credentials vulnerability [CWE-522] in FortiNAC-F 7.2.0, FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.8 and below, 8.8.0 all versions, 8.7.0 all versions may allow a local attacker with system access to retrieve users' passwords.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiNAC | >=8.7.0<=9.1.8 | |
Fortinet FortiNAC | >=9.2.0<9.2.7 | |
Fortinet FortiNAC | >=9.4.0<9.4.2 | |
Fortinet FortiNAC-F | =7.2.0 |
Please upgrade to FortiNAC-F version 7.2.1 or above Please upgrade to FortiNAC version 9.4.2 or above Please upgrade to FortiNAC version 9.2.7 or above After the upgrade, the CLI account password should be changed. To know which accounts require a new password, the following command can be run: grep ":\$1" /etc/shadow Then, login to the CLI with that user and type "passwd" to change the password and update the hash.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45859 is considered a high severity vulnerability due to its potential to allow local attackers to retrieve users' passwords.
To resolve CVE-2022-45859, you should update FortiNAC to the latest version provided by Fortinet that addresses this vulnerability.
CVE-2022-45859 affects FortiNAC-F 7.2.0 and FortiNAC versions 8.7.0 to 9.4.1.
CVE-2022-45859 is classified as an insufficiently protected credentials vulnerability, categorized under CWE-522.
CVE-2022-45859 can be exploited by local attackers who have system access to the affected FortiNAC environments.