Improper Authentication in Fortinet FortiSIEM Affects Glassfish Server
CVE-2022-26119

7.8HIGH

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
2 November 2022

Summary

An improper authentication vulnerability in Fortinet's FortiSIEM prior to version 6.5.0 allows local attackers with CLI access to interact directly with the Glassfish server using a hardcoded password. This flaw opens avenues for unauthorized operations within the network, potentially leading to further exploitation if not promptly addressed.

Affected Version(s)

Fortinet FortiSIEM FortiSIEM 6.4.0, 6.3.3, 6.3.2, 6.3.1, 6.3.0, 6.2.1, 6.2.0, 6.1.2, 6.1.1, 6.1.0, 5.4.0, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.2, 5.2.1, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.1, 5.0.0

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.