First published: Mon Jun 12 2023(Updated: )
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS / FortiProxy log events may allow a remote authenticated attacker to read certain passwords in ciphertext.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.15 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiOS IPS Engine | >=6.0 | |
Fortinet FortiProxy | >=7.2.0<=7.2.1 | |
Fortinet FortiProxy | >=7.0.0<=7.0.7 | |
Fortinet FortiProxy | >=2.0.0<=2.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-22-455 is rated based on the potential exposure of sensitive information through log files.
To fix FG-IR-22-455, upgrade to FortiOS version 7.2.6 or later, or FortiProxy version 7.2.2 or later, according to your specific software.
FG-IR-22-455 may expose certain passwords in ciphertext to remote authenticated attackers through log files.
FortiOS versions from 7.0.0 to 7.2.5 and various earlier versions are affected by FG-IR-22-455.
Currently, no specific workarounds are documented for FG-IR-22-455; patching is recommended.