Improper Authentication in Fortinet FortiSIEM Affects Glassfish Server
CVE-2022-26119
7.8HIGH
Summary
An improper authentication vulnerability in Fortinet's FortiSIEM prior to version 6.5.0 allows local attackers with CLI access to interact directly with the Glassfish server using a hardcoded password. This flaw opens avenues for unauthorized operations within the network, potentially leading to further exploitation if not promptly addressed.
Affected Version(s)
Fortinet FortiSIEM FortiSIEM 6.4.0, 6.3.3, 6.3.2, 6.3.1, 6.3.0, 6.2.1, 6.2.0, 6.1.2, 6.1.1, 6.1.0, 5.4.0, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.2, 5.2.1, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.1, 5.0.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved