Cleartext Storage Vulnerability in FortiOS SSL VPN and FortiProxy Products
CVE-2019-17655
5.3MEDIUM
Key Information:
- Vendor
- Fortinet
- Vendor
- CVE Published:
- 16 June 2020
Summary
A vulnerability exists in certain versions of FortiOS SSL VPN and FortiProxy where user credentials are stored in cleartext. If an attacker gains access to the device's file system, they may retrieve sensitive login information of sessions, posing a significant risk to user security and data integrity. This issue affects multiple versions, which raises concerns for organizations using these solutions for secure remote access.
Affected Version(s)
Fortinet FortiOS and FortiProxy FortiOS 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved