First published: Tue Feb 11 2025(Updated: )
A use of hard-coded cryptographic key to encrypt sensitive data vulnerability [CWE-321] in FortiManager may allow an attacker with JSON API access permissions to decrypt some secrets even if the 'private-data-encryption' setting is enabled.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | >=7.6.0<=7.6.1 | |
Fortinet FortiManager | >=7.4.0<=7.4.5 | |
Fortinet FortiManager | >=7.2.0<=7.2.9 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.5 | |
Fortinet FortiManager Cloud | >=7.2.1<=7.2.8 | |
Fortinet FortiManager Cloud | >=7.0 | |
Fortinet FortiManager Cloud | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
FG-IR-24-094 is a critical vulnerability due to its potential to expose encrypted sensitive data.
To mitigate FG-IR-24-094, upgrade FortiManager to version 7.6.2 or later, or to versions 7.4.6, 7.2.10, or applicable updates as recommended.
FortiManager versions between 7.6.0 and 7.6.1, 7.4.0 and 7.4.5, and 7.2.0 and 7.2.9 are impacted by FG-IR-24-094.
Yes, FortiManager Cloud versions between 7.4.1 and 7.4.5, as well as 7.2.1 and 7.2.8, are subject to FG-IR-24-094.
Exploitation of FG-IR-24-094 requires JSON API access permissions, allowing an attacker to potentially decrypt sensitive data.