First published: Tue Feb 11 2025(Updated: )
An insertion of sensitive information into log file vulnerabilities [CWE-532] in FortiAnalyzer and FortiManager eventlog may allow any low privileged user with access to event log section to retrieve certificate private key and encrypted password logged as system log.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.3 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.8 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.12 | |
Fortinet FortiAnalyzer | >=6.2.0<=6.2.11 | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.8 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.9 or above Please upgrade to FortiAnalyzer version 6.4.13 or above Please upgrade to FortiAnalyzer version 6.2.12 or above Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.9 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40585 is classified as a high severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2024-40585, update FortiAnalyzer and FortiManager to the recommended versions or later as specified in the advisory.
CVE-2024-40585 affects various versions of FortiAnalyzer and FortiManager, specifically those below the specified remediation versions.
CVE-2024-40585 allows low privileged users to retrieve sensitive information such as certificate private keys and encrypted passwords from system logs.
Any organization using affected versions of FortiAnalyzer or FortiManager with low privileged access to the event log section is vulnerable to CVE-2024-40585.