First published: Tue Oct 10 2023(Updated: )
An insertion of sensitive information into log file vulnerability in Fortinet FortiGuest 1.0.0 allows a local attacker to access plaintext passwords in the RADIUS logs.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiGuest | =1.0.0 |
Please upgrade to FortiGuest version 1.1.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Fortinet FortiGuest vulnerability is CVE-2023-25604.
CVE-2023-25604 has a severity rating of medium.
CVE-2023-25604 allows a local attacker to access plaintext passwords in the RADIUS logs of Fortinet FortiGuest 1.0.0.
CVE-2023-25604 affects Fortinet FortiGuest 1.0.0.
Please refer to the official reference provided by Fortinet for information on available fixes for CVE-2023-25604.