Hard-Coded Cryptographic Key Vulnerability in FortiClient for Windows
CVE-2019-16150
5.5MEDIUM
Key Information:
- Vendor
- Fortinet
- Vendor
- CVE Published:
- 4 June 2020
Summary
The vulnerability pertains to the use of a hard-coded cryptographic key in FortiClient for Windows, versions prior to 6.4.0. This flaw allows an attacker with access to the local storage or the configuration backup file to decrypt sensitive security data. The hard-coded nature of the key raises significant concerns about the confidentiality of encrypted information, making it imperative for users to upgrade to a patched version to mitigate risks associated with unauthorized data access.
Affected Version(s)
Fortinet FortiClient for Windows FortiClient for Windows below 6.4.0
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved