CVE-2020-6648

A cleartext storage of sensitive information vulnerability in FortiOS command line interface in versions 6.2.4 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an authenticated attacker to obtain sensitive information such as users passwords by connecting to FortiGate CLI and executing the "diag sys ha checksum show" command.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

15 Jun 2022, 03:18

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*
References (CONFIRM) https://www.fortiguard.com/psirt/FG-IR-20-236 - (CONFIRM) https://www.fortiguard.com/psirt/FG-IR-20-236 - Vendor Advisory
References (CONFIRM) https://www.fortiguard.com/psirt/FG-IR-20-009 - Broken Link (CONFIRM) https://www.fortiguard.com/psirt/FG-IR-20-009 - Vendor Advisory

Information

Published : 2020-10-21 14:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-6648

Mitre link : CVE-2020-6648

CVE.ORG link : CVE-2020-6648


JSON object : View

Products Affected

fortinet

  • fortios
  • fortiproxy
CWE
CWE-312

Cleartext Storage of Sensitive Information