First published: Tue Nov 14 2023(Updated: )
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.
|Affected Software||Affected Version||How to fix|
CVE-2023-45585 is a vulnerability in FortiSIEM that allows for the insertion of sensitive information into log files.
FortiSIEM versions 7.0.0, 6.7.6 and below, 6.6.3 and below, 6.5.1 and below, 6.4.2 and below, 6.3.3 and below, 6.2.1 and below, 6.1.2 and below, and 5.4.0 are affected by CVE-2023-45585.
CVE-2023-45585 has a severity rating of 3.3 (low).
To fix the CVE-2023-45585 vulnerability, it is recommended to update FortiSIEM to a version that is not affected by the vulnerability.
More information about CVE-2023-45585 can be found at the following link: [FortiGuard Advisory FG-IR-23-392](https://fortiguard.com/psirt/FG-IR-23-392).