First published: Thu Feb 16 2023(Updated: )
A clear text storage of sensitive information (CWE-312) vulnerability in both FortiGate and FortiAuthenticator may allow a local unauthorized party to retrieve the Fortinet private keys used to establish secure communication with both Apple Push Notification and Google Cloud Messaging services, via accessing the files on the filesystem. The potentially exposed private keys have been revoked, please upgrade to the versions provided in the solutions to support push proxy.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiGate | ||
Fortinet FortiAuthenticator |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-014 is significant due to the potential exposure of sensitive information like Fortinet private keys.
To fix FG-IR-20-014, you should implement proper encryption for sensitive information storage in FortiGate and FortiAuthenticator.
FG-IR-20-014 affects users of Fortinet FortiGate and FortiAuthenticator products.
FG-IR-20-014 is classified as a clear text storage of sensitive information vulnerability (CWE-312).
FG-IR-20-014 cannot be exploited remotely as it requires local access to retrieve the sensitive information.