A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the "diag sys ha checksum show" command.
References
Link | Resource |
---|---|
https://www.fortiguard.com/psirt/FG-IR-20-009 | Vendor Advisory |
https://www.fortiguard.com/psirt/FG-IR-20-236 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Jun 2022, 03:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.fortiguard.com/psirt/FG-IR-20-236 - Vendor Advisory | |
References | (CONFIRM) https://www.fortiguard.com/psirt/FG-IR-20-009 - Vendor Advisory |
Information
Published : 2020-10-21 14:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-6648
Mitre link : CVE-2020-6648
CVE.ORG link : CVE-2020-6648
JSON object : View
Products Affected
fortinet
- fortios
- fortiproxy
CWE
CWE-312
Cleartext Storage of Sensitive Information