First published: Tue Jun 11 2024(Updated: )
A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS and FortiProxy may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiProxy | >=7.4.0<=7.4.2 | |
Fortinet FortiProxy | >=7.2 | |
Fortinet FortiProxy | >=7.0 | |
Fortinet FortiProxy | >=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-423 is considered critical due to the potential for privileged attackers to decrypt backup files.
To fix FG-IR-23-423, upgrade to FortiOS version 7.4.4 or later, or FortiProxy version 7.4.3 or later.
FortiOS versions 7.4.0 to 7.4.3, 7.2.0 to 7.2.8, and earlier versions 7.0 and 6.4 are affected by FG-IR-23-423.
FortiProxy versions 7.4.0 to 7.4.2 and all earlier versions 7.0 and below are affected by FG-IR-23-423.
Privileged attackers with super-admin profiles and CLI access are vulnerable to exploiting FG-IR-23-423.