Vulnerabilites related to fortinet - fortisiem
cve-2018-13378
Vulnerability from cvelistv5
Published
2019-04-17 14:41
Modified
2024-10-25 14:30
Severity ?
Summary
An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code.
References
Impacted products
Vendor Product Version
n/a Fortinet FortiSIEM Version: FortiSIEM 5.2.0
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T09:00:35.136Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/advisory/FG-IR-18-382",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2018-13378",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-24T20:03:58.376877Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T14:30:28.744Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "FortiSIEM 5.2.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2019-04-17T14:41:29",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://fortiguard.com/advisory/FG-IR-18-382",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2018-13378",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiSIEM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FortiSIEM 5.2.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/advisory/FG-IR-18-382",
                     refsource: "MISC",
                     url: "https://fortiguard.com/advisory/FG-IR-18-382",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2018-13378",
      datePublished: "2019-04-17T14:41:29",
      dateReserved: "2018-07-06T00:00:00",
      dateUpdated: "2024-10-25T14:30:28.744Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-55592
Vulnerability from cvelistv5
Published
2025-03-11 14:54
Modified
2025-03-11 16:07
Summary
An incorrect authorization vulnerability [CWE-863] in FortiSIEM 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions, may allow an authenticated attacker to perform unauthorized operations on incidents via crafted HTTP requests.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.2.0    7.2.5
Version: 7.1.0    7.1.7
Version: 7.0.0    7.0.3
Version: 6.7.0    6.7.9
Version: 6.6.0    6.6.5
Version: 6.5.0    6.5.3
Version: 6.4.0    6.4.4
Version: 6.3.0    6.3.3
Version: 6.2.0    6.2.1
Version: 6.1.0    6.1.2
Version: 5.4.0
Version: 5.3.0    5.3.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-55592",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-11T16:06:54.927466Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-11T16:07:03.773Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [],
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.2.5",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.1.7",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.3",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.9",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.5",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.3",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.4",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.3.3",
                     status: "affected",
                     version: "6.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.1",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An incorrect authorization vulnerability [CWE-863] in FortiSIEM 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions, may allow an authenticated attacker to perform unauthorized operations on incidents via crafted HTTP requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.6,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N/E:P/RL:X/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-863",
                     description: "Improper access control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T14:54:29.067Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.fortinet.com/psirt/FG-IR-24-377",
               url: "https://fortiguard.fortinet.com/psirt/FG-IR-24-377",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.3.0 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2024-55592",
      datePublished: "2025-03-11T14:54:29.067Z",
      dateReserved: "2024-12-09T11:19:49.470Z",
      dateUpdated: "2025-03-11T16:07:03.773Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-23109
Vulnerability from cvelistv5
Published
2024-02-05 13:26
Modified
2024-08-01 22:51
Summary
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.1.1
Version: 7.0.0    7.0.2
Version: 6.7.0    6.7.8
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:7.1.1:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        status: "affected",
                        version: "7.1.1",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:7.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "7.0.2",
                        status: "affected",
                        version: "7.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "6.7.8",
                        status: "affected",
                        version: "6.7.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "6.6.3",
                        status: "affected",
                        version: "6.6.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "6.5.2",
                        status: "affected",
                        version: "6.5.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-23109",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-10-16T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:45:45.523Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:51:11.339Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-130",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-130",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "7.1.1",
                  },
                  {
                     lessThanOrEqual: "7.0.2",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.8",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.2",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.7,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:X/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-78",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T13:26:02.611Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-130",
               url: "https://fortiguard.com/psirt/FG-IR-23-130",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.1.2 or above  \nPlease upgrade to upcoming FortiSIEM version 7.2.0 or above  \nPlease upgrade to upcoming FortiSIEM version 7.0.3 or above  \nPlease upgrade to upcoming FortiSIEM version 6.7.9 or above  \nPlease upgrade to upcoming FortiSIEM version 6.6.5 or above  \nPlease upgrade to upcoming FortiSIEM version 6.5.3 or above  \nPlease upgrade to upcoming FortiSIEM version 6.4.4 or above  \n",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2024-23109",
      datePublished: "2024-02-05T13:26:02.611Z",
      dateReserved: "2024-01-11T16:29:07.979Z",
      dateUpdated: "2024-08-01T22:51:11.339Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-17651
Vulnerability from cvelistv5
Published
2020-01-28 00:44
Modified
2024-10-25 14:03
Severity ?
Summary
An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule.
References
https://fortiguard.com/psirt/FG-IR-19-197x_refsource_CONFIRM
Impacted products
Vendor Product Version
Fortinet Fortinet FortiSIEM Version: FortiSIEM version 5.2.5 and below
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T01:47:13.641Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-19-197",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2019-17651",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T13:59:35.873274Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T14:03:59.971Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "FortiSIEM version 5.2.5 and below",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-01-28T00:44:30",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://fortiguard.com/psirt/FG-IR-19-197",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2019-17651",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiSIEM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FortiSIEM version 5.2.5 and below",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Fortinet",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Execute unauthorized code or commands",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/psirt/FG-IR-19-197",
                     refsource: "CONFIRM",
                     url: "https://fortiguard.com/psirt/FG-IR-19-197",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2019-17651",
      datePublished: "2020-01-28T00:44:30",
      dateReserved: "2019-10-16T00:00:00",
      dateUpdated: "2024-10-25T14:03:59.971Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-41676
Vulnerability from cvelistv5
Published
2023-11-14 18:05
Modified
2024-08-30 18:13
Summary
An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.0.0
Version: 6.7.0    6.7.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T19:01:35.398Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-290",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-290",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-41676",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-30T18:13:11.174777Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-30T18:13:25.243Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "7.0.0",
                  },
                  {
                     lessThanOrEqual: "6.7.5",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version  7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "Information disclosure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T18:05:39.178Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-290",
               url: "https://fortiguard.com/psirt/FG-IR-23-290",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.1.0 or above\nPlease upgrade to FortiSIEM version 7.0.1 or above\nPlease upgrade to FortiSIEM version 6.7.6 or above\n",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-41676",
      datePublished: "2023-11-14T18:05:39.178Z",
      dateReserved: "2023-08-30T13:42:39.547Z",
      dateUpdated: "2024-08-30T18:13:25.243Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-42478
Vulnerability from cvelistv5
Published
2023-06-13 08:41
Modified
2024-10-23 14:27
Summary
An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 6.7.0
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.1
Version: 6.4.0    6.4.2
Version: 6.3.0    6.3.3
Version: 6.2.0    6.2.1
Version: 6.1.0    6.1.2
Version: 5.4.0
Version: 5.3.0    5.3.3
Version: 5.2.5    5.2.8
Version: 5.2.1    5.2.2
Version: 5.1.0    5.1.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T13:10:40.933Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-22-258",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-22-258",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-42478",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T14:10:59.872029Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-23T14:27:01.609Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "6.7.0",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.1",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.2",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.3.3",
                     status: "affected",
                     version: "6.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.1",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.2.8",
                     status: "affected",
                     version: "5.2.5",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.2.2",
                     status: "affected",
                     version: "5.2.1",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.1.3",
                     status: "affected",
                     version: "5.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:U/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-307",
                     description: "Improper access control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-13T08:41:42.765Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-22-258",
               url: "https://fortiguard.com/psirt/FG-IR-22-258",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.0.0 or above Please upgrade to FortiSIEM version 6.7.1 or above ",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2022-42478",
      datePublished: "2023-06-13T08:41:42.765Z",
      dateReserved: "2022-10-07T14:05:36.302Z",
      dateUpdated: "2024-10-23T14:27:01.609Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-40723
Vulnerability from cvelistv5
Published
2025-03-11 14:54
Modified
2025-03-12 04:00
Summary
An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 6.7.0    6.7.4
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.1
Version: 6.4.0    6.4.2
Version: 6.3.0    6.3.3
Version: 6.2.0    6.2.1
Version: 6.1.0    6.1.2
Version: 5.4.0
Version: 5.3.0    5.3.3
Version: 5.2.5    5.2.8
Version: 5.2.1    5.2.2
Version: 5.1.0    5.1.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-40723",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-11T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-12T04:00:49.660Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [],
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "6.7.4",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.1",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.2",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.3.3",
                     status: "affected",
                     version: "6.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.1",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.2.8",
                     status: "affected",
                     version: "5.2.5",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.2.2",
                     status: "affected",
                     version: "5.2.1",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.1.3",
                     status: "affected",
                     version: "5.1.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T14:54:28.770Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-117",
               url: "https://fortiguard.com/psirt/FG-IR-23-117",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.0.2 or above \nPlease upgrade to FortiSIEM version 7.0.0 or above \nPlease upgrade to FortiSIEM version 6.7.5 or above \nPlease upgrade to FortiSIEM version 6.6.4 or above \nPlease upgrade to FortiSIEM version 6.5.2 or above \nPlease upgrade to FortiSIEM version 6.4.3 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-40723",
      datePublished: "2025-03-11T14:54:28.770Z",
      dateReserved: "2023-08-21T09:03:44.316Z",
      dateUpdated: "2025-03-12T04:00:49.660Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-6700
Vulnerability from cvelistv5
Published
2020-01-07 18:19
Modified
2024-10-25 14:04
Severity ?
Summary
An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code.
References
https://fortiguard.com/advisory/FG-IR-19-100x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a Fortinet FortiSIEM Version: FortiSIEM 5.2.2 and earlier
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T20:31:04.075Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/advisory/FG-IR-19-100",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2019-6700",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T13:59:41.043235Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T14:04:46.137Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEM",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "FortiSIEM 5.2.2 and earlier",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-01-07T18:19:04",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://fortiguard.com/advisory/FG-IR-19-100",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2019-6700",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiSIEM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FortiSIEM 5.2.2 and earlier",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/advisory/FG-IR-19-100",
                     refsource: "CONFIRM",
                     url: "https://fortiguard.com/advisory/FG-IR-19-100",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2019-6700",
      datePublished: "2020-01-07T18:19:04",
      dateReserved: "2019-01-23T00:00:00",
      dateUpdated: "2024-10-25T14:04:46.137Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-34992
Vulnerability from cvelistv5
Published
2023-10-10 16:50
Modified
2024-08-02 16:17
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.0.0
Version: 6.7.0    6.7.5
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.1
Version: 6.4.0    6.4.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "7.1.1",
                        status: "affected",
                        version: "7.1.0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "7.0.2",
                        status: "affected",
                        version: "7.0.0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "6.7.8",
                        status: "affected",
                        version: "6.7.0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "6.6.3",
                        status: "affected",
                        version: "6.6.0",
                        versionType: "semver",
                     },
                     {
                        lessThanOrEqual: "6.5.2",
                        status: "affected",
                        version: "6.5.0",
                        versionType: "semver",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-34992",
                        options: [
                           {
                              Exploitation: "None",
                           },
                           {
                              Automatable: "Yes",
                           },
                           {
                              "Technical Impact": "Total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2023-10-16T00:00:00+00:00",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-04T17:21:10.889Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:17:04.307Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-130",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-130",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "7.0.0",
                  },
                  {
                     lessThanOrEqual: "6.7.5",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.1",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.2",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.6,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-78",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-10-10T16:50:21.319Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-130",
               url: "https://fortiguard.com/psirt/FG-IR-23-130",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.0.1 or above\r\nPlease upgrade to FortiSIEM version 6.7.6 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.6.4 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.5.2 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.4.3 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-34992",
      datePublished: "2023-10-10T16:50:21.319Z",
      dateReserved: "2023-06-09T06:59:37.971Z",
      dateUpdated: "2024-08-02T16:17:04.307Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-41022
Vulnerability from cvelistv5
Published
2021-11-02 18:23
Modified
2024-10-25 13:46
Summary
A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts
References
https://fortiguard.com/advisory/FG-IR-21-176x_refsource_CONFIRM
Impacted products
Vendor Product Version
Fortinet Fortinet FortiSIEMWindowsAgent Version: FortiSIEMWindowsAgent 4.1.4, 4.1.3, 4.1.2, 4.1.1, 4.1.0, 4.0.0, 3.3.0, 3.2.2, 3.2.1, 3.2.0, 3.1.2, 3.1.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:59:30.336Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/advisory/FG-IR-21-176",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-41022",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T14:13:24.050265Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T13:46:06.528Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEMWindowsAgent",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "FortiSIEMWindowsAgent 4.1.4, 4.1.3, 4.1.2, 4.1.1, 4.1.0, 4.0.0, 3.3.0, 3.2.2, 3.2.1, 3.2.0, 3.1.2, 3.1.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 7.5,
                  temporalSeverity: "HIGH",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-02T18:23:56",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://fortiguard.com/advisory/FG-IR-21-176",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2021-41022",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiSIEMWindowsAgent",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FortiSIEMWindowsAgent 4.1.4, 4.1.3, 4.1.2, 4.1.1, 4.1.0, 4.0.0, 3.3.0, 3.2.2, 3.2.1, 3.2.0, 3.1.2, 3.1.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Fortinet",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  integrityImpact: "High",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  userInteraction: "None",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:O/RC:C",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Execute unauthorized code or commands",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/advisory/FG-IR-21-176",
                     refsource: "CONFIRM",
                     url: "https://fortiguard.com/advisory/FG-IR-21-176",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2021-41022",
      datePublished: "2021-11-02T18:23:56",
      dateReserved: "2021-09-13T00:00:00",
      dateUpdated: "2024-10-25T13:46:06.528Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-46667
Vulnerability from cvelistv5
Published
2025-01-14 14:09
Modified
2025-02-18 21:37
Summary
A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.1.0    7.1.5
Version: 7.0.0    7.0.3
Version: 6.7.0    6.7.9
Version: 6.6.0    6.6.5
Version: 6.5.0    6.5.3
Version: 6.4.0    6.4.4
Version: 6.3.0    6.3.3
Version: 6.2.0    6.2.1
Version: 6.1.0    6.1.2
Version: 5.4.0
Version: 5.3.0    5.3.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-46667",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-14T14:27:09.560945Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-18T21:37:18.364Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [],
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.1.5",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.3",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.9",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.5",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.3",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.4",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.3.3",
                     status: "affected",
                     version: "6.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.1",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:W/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-770",
                     description: "Denial of service",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-14T14:09:58.844Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.fortinet.com/psirt/FG-IR-24-164",
               url: "https://fortiguard.fortinet.com/psirt/FG-IR-24-164",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.2.0 or above \nPlease upgrade to FortiSIEM version 7.1.6 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2024-46667",
      datePublished: "2025-01-14T14:09:58.844Z",
      dateReserved: "2024-09-11T12:14:59.204Z",
      dateUpdated: "2025-02-18T21:37:18.364Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36551
Vulnerability from cvelistv5
Published
2023-09-13 12:29
Modified
2024-09-24 19:59
Summary
A exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.5 allows attacker to information disclosure via a crafted http request.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 6.7.0    6.7.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:52:53.063Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-126",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-126",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36551",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-24T19:45:27.559681Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-24T19:59:51.691Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "6.7.5",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.5 allows attacker to information disclosure via a crafted http request.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.2,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:X",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-200",
                     description: "Information disclosure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-09-13T12:29:10.219Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-126",
               url: "https://fortiguard.com/psirt/FG-IR-23-126",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.0.0 or above Please upgrade to FortiSIEM version 6.7.6 or above Please upgrade to FortiSIEM version 6.6.0 or above ",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-36551",
      datePublished: "2023-09-13T12:29:10.219Z",
      dateReserved: "2023-06-23T14:57:30.033Z",
      dateUpdated: "2024-09-24T19:59:51.691Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-40714
Vulnerability from cvelistv5
Published
2025-04-02 08:06
Modified
2025-04-02 16:16
Summary
A relative path traversal in Fortinet FortiSIEM versions 7.0.0, 6.7.0 through 6.7.2, 6.6.0 through 6.6.3, 6.5.1, 6.5.0 allows attacker to escalate privilege via uploading certain GUI elements
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.0.0
Version: 6.7.0    6.7.2
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-40714",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-04-02T16:14:52.268463Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-02T16:16:37.645Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [],
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "7.0.0",
                  },
                  {
                     lessThanOrEqual: "6.7.2",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.1",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A relative path traversal in Fortinet FortiSIEM versions 7.0.0, 6.7.0 through 6.7.2, 6.6.0 through 6.6.3, 6.5.1, 6.5.0 allows attacker to escalate privilege via uploading certain GUI elements",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.7,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:X/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-23",
                     description: "Escalation of privilege",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-04-02T08:06:48.075Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-085",
               url: "https://fortiguard.com/psirt/FG-IR-23-085",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.0.1 or above\nPlease upgrade to FortiSIEM version 6.7.4 or above\nPlease upgrade to FortiSIEM version 6.6.4 or above\nPlease upgrade to FortiSIEM version 6.5.2 or above\nPlease upgrade to FortiSIEM version 6.4.3 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-40714",
      datePublished: "2025-04-02T08:06:48.075Z",
      dateReserved: "2023-08-21T09:03:44.315Z",
      dateUpdated: "2025-04-02T16:16:37.645Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-26119
Vulnerability from cvelistv5
Published
2022-11-02 00:00
Modified
2024-10-25 13:27
Summary
A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.
Impacted products
Vendor Product Version
Fortinet Fortinet FortiSIEM Version: FortiSIEM 6.4.0, 6.3.3, 6.3.2, 6.3.1, 6.3.0, 6.2.1, 6.2.0, 6.1.2, 6.1.1, 6.1.0, 5.4.0, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.2, 5.2.1, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.1, 5.0.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T04:56:37.489Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-22-064",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-26119",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T14:12:15.590461Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T13:27:19.971Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "FortiSIEM 6.4.0, 6.3.3, 6.3.2, 6.3.1, 6.3.0, 6.2.1, 6.2.0, 6.1.2, 6.1.1, 6.1.0, 5.4.0, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.2, 5.2.1, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.1, 5.0.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "PROOF_OF_CONCEPT",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  remediationLevel: "UNAVAILABLE",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 7.4,
                  temporalSeverity: "HIGH",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Improper access control",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-11-02T00:00:00",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               url: "https://fortiguard.com/psirt/FG-IR-22-064",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2022-26119",
      datePublished: "2022-11-02T00:00:00",
      dateReserved: "2022-02-25T00:00:00",
      dateUpdated: "2024-10-25T13:27:19.971Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-41023
Vulnerability from cvelistv5
Published
2021-11-02 18:26
Modified
2024-10-25 13:45
Summary
A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files
References
https://fortiguard.com/advisory/FG-IR-21-175x_refsource_CONFIRM
Impacted products
Vendor Product Version
Fortinet Fortinet FortiSIEMWindowsAgent Version: FortiSIEMWindowsAgent 4.1.4, 4.1.3, 4.1.2, 4.1.1, 4.1.0, 4.0.0, 3.3.0, 3.2.2, 3.2.1, 3.2.0, 3.1.2, 3.1.0
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T02:59:31.055Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/advisory/FG-IR-21-175",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-41023",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T13:57:55.442977Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T13:45:51.643Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEMWindowsAgent",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "FortiSIEMWindowsAgent 4.1.4, 4.1.3, 4.1.2, 4.1.1, 4.1.0, 4.0.0, 3.3.0, 3.2.2, 3.2.1, 3.2.0, 3.1.2, 3.1.0",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitCodeMaturity: "NOT_DEFINED",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  remediationLevel: "OFFICIAL_FIX",
                  reportConfidence: "CONFIRMED",
                  scope: "UNCHANGED",
                  temporalScore: 5.3,
                  temporalSeverity: "MEDIUM",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:O/RC:C",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-02T18:26:34",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://fortiguard.com/advisory/FG-IR-21-175",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2021-41023",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiSIEMWindowsAgent",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FortiSIEMWindowsAgent 4.1.4, 4.1.3, 4.1.2, 4.1.1, 4.1.0, 4.0.0, 3.3.0, 3.2.2, 3.2.1, 3.2.0, 3.1.2, 3.1.0",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Fortinet",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files",
                  },
               ],
            },
            impact: {
               cvss: {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  availabilityImpact: "None",
                  baseScore: 5.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  userInteraction: "None",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:O/RC:C",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/advisory/FG-IR-21-175",
                     refsource: "CONFIRM",
                     url: "https://fortiguard.com/advisory/FG-IR-21-175",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2021-41023",
      datePublished: "2021-11-02T18:26:34",
      dateReserved: "2021-09-13T00:00:00",
      dateUpdated: "2024-10-25T13:45:51.643Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-17653
Vulnerability from cvelistv5
Published
2020-03-12 22:07
Modified
2024-10-25 14:26
Severity ?
Summary
A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link.
References
https://fortiguard.com/psirt/FG-IR-19-240x_refsource_CONFIRM
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T01:47:13.491Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-19-240",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2019-17653",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-24T20:03:44.199682Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T14:26:44.454Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.5",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-03-12T22:07:43",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://fortiguard.com/psirt/FG-IR-19-240",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2019-17653",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiSIEM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "5.2.5",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Fortinet",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Execute unauthorized code or commands",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/psirt/FG-IR-19-240",
                     refsource: "CONFIRM",
                     url: "https://fortiguard.com/psirt/FG-IR-19-240",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2019-17653",
      datePublished: "2020-03-12T22:07:43",
      dateReserved: "2019-10-16T00:00:00",
      dateUpdated: "2024-10-25T14:26:44.454Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-17659
Vulnerability from cvelistv5
Published
2025-03-17 13:06
Modified
2025-03-17 13:35
Summary
A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 5.2.6
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2019-17659",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-17T13:35:01.135210Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-17T13:35:08.816Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [],
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "5.2.6",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user \"tunneluser\" by leveraging knowledge of the private key from another installation or a firmware image.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 3.6,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:X/RC:X",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-798",
                     description: "Improper access control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-17T13:06:07.828Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.fortinet.com/psirt/FG-IR-19-296",
               url: "https://fortiguard.fortinet.com/psirt/FG-IR-19-296",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. \r\nWorkaround (for FortiSIEM version 5.2.6 and lower): \r\nCustomers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999  by following the steps below :\r\n1. SSH to the Supervisor node as the root user.\r\n2. Remove tunneluser SSH configuration file to disable listening on port 19999:\r\nrm -f /etc/ssh/sshd_config.tunneluser\r\necho rm -f /etc/ssh/sshd_config.tunneluser >> /etc/init.d/phProvision.sh\r\n3. Then terminate sshd running on TCP Port 19999 as follows:\r\npkill -f /usr/sbin/sshd -p 19999\r\n4.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account:\r\nrm -f /opt/phoenix/deployment/id_rsa.pub.tunneluser\r\nrm -f /home/tunneluser/.ssh/authorized_keys\r\nrm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsa\r\nCustomers are also advised to disable \"tunneluser\" SSH access on port 22 by following the steps bwlow:\r\n1. SSH to the Supervisor node as the root user.\r\n2. Add/edit the following line in sshd_config file: \r\necho DenyUsers tunneluser >>  /etc/ssh/sshd_config\r\n3. service sshd restart",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2019-17659",
      datePublished: "2025-03-17T13:06:07.828Z",
      dateReserved: "2019-10-16T00:00:00.000Z",
      dateUpdated: "2025-03-17T13:35:08.816Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-36553
Vulnerability from cvelistv5
Published
2023-11-14 18:05
Modified
2024-10-22 20:53
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 5.4.0
Version: 5.3.0    5.3.3
Version: 5.2.5    5.2.8
Version: 5.2.1    5.2.2
Version: 5.1.0    5.1.3
Version: 5.0.0    5.0.1
Version: 4.10.0
Version: 4.9.0
Version: 4.7.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T16:52:53.255Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-135",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-135",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-36553",
                        options: [
                           {
                              Exploitation: "None",
                           },
                           {
                              Automatable: "Yes",
                           },
                           {
                              "Technical Impact": "Total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T20:53:09.880667Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T20:53:32.183Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.2.8",
                     status: "affected",
                     version: "5.2.5",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.2.2",
                     status: "affected",
                     version: "5.2.1",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.1.3",
                     status: "affected",
                     version: "5.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.0.1",
                     status: "affected",
                     version: "5.0.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "4.10.0",
                  },
                  {
                     status: "affected",
                     version: "4.9.0",
                  },
                  {
                     status: "affected",
                     version: "4.7.2",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.3,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-78",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T18:05:29.387Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-135",
               url: "https://fortiguard.com/psirt/FG-IR-23-135",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.1.0 or above\nPlease upgrade to FortiSIEM version 7.0.1 or above\nPlease upgrade to FortiSIEM version 6.7.6 or above\nPlease upgrade to FortiSIEM version 6.6.4 or above\nPlease upgrade to FortiSIEM version 6.5.2 or above\nPlease upgrade to FortiSIEM version 6.4.3 or above\n",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-36553",
      datePublished: "2023-11-14T18:05:29.387Z",
      dateReserved: "2023-06-23T14:57:30.033Z",
      dateUpdated: "2024-10-22T20:53:32.183Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-27780
Vulnerability from cvelistv5
Published
2025-02-11 16:09
Modified
2025-02-12 15:40
Summary
Multiple Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabilities [CWE-79] in FortiSIEM 7.1 all versions, 7.0 all versions, 6.7 all versions incident page may allow an authenticated attacker to perform a cross-site scripting attack via crafted HTTP requests.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.1.0    7.1.7
Version: 7.0.0    7.0.3
Version: 6.7.0    6.7.9
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-27780",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-11T16:34:35.441554Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-12T15:40:18.384Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [],
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.1.7",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.3",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.9",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Multiple Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerabilities [CWE-79] in FortiSIEM  7.1 all versions, 7.0 all versions, 6.7 all versions incident page may allow an authenticated attacker to perform a cross-site scripting attack via crafted HTTP requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 2.2,
                  baseSeverity: "LOW",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N/E:F/RL:X/RC:X",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-02-11T16:09:12.668Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.fortinet.com/psirt/FG-IR-23-324",
               url: "https://fortiguard.fortinet.com/psirt/FG-IR-23-324",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.3.0 or above \nPlease upgrade to FortiSIEM version 7.2.0 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2024-27780",
      datePublished: "2025-02-11T16:09:12.668Z",
      dateReserved: "2024-02-26T14:46:31.334Z",
      dateUpdated: "2025-02-12T15:40:18.384Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2019-16153
Vulnerability from cvelistv5
Published
2020-01-23 16:39
Modified
2024-10-25 14:27
Severity ?
Summary
A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials.
References
https://fortiguard.com/advisory/FG-IR-19-195x_refsource_CONFIRM
Impacted products
Vendor Product Version
Fortinet Fortinet FortiSIEM Version: FortiSIEM 5.2.5 and below
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T01:10:41.212Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/advisory/FG-IR-19-195",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2019-16153",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-24T20:11:00.215827Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-25T14:27:30.098Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Fortinet FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "FortiSIEM 5.2.5 and below",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-01-23T16:39:59",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://fortiguard.com/advisory/FG-IR-19-195",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@fortinet.com",
               ID: "CVE-2019-16153",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Fortinet FortiSIEM",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "FortiSIEM 5.2.5 and below",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Fortinet",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://fortiguard.com/advisory/FG-IR-19-195",
                     refsource: "CONFIRM",
                     url: "https://fortiguard.com/advisory/FG-IR-19-195",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2019-16153",
      datePublished: "2020-01-23T16:39:59",
      dateReserved: "2019-09-09T00:00:00",
      dateUpdated: "2024-10-25T14:27:30.098Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-26204
Vulnerability from cvelistv5
Published
2023-06-13 08:41
Modified
2024-10-22 20:45
Summary
A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 6.7.0    6.7.5
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.1
Version: 6.4.0    6.4.2
Version: 6.3.0    6.3.3
Version: 6.2.0    6.2.1
Version: 6.1.0    6.1.2
Version: 5.4.0
Version: 5.3.0    5.3.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:39:06.667Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-21-141",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-21-141",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-26204",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T20:17:58.321671Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T20:45:34.996Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "6.7.5",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.1",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.2",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.3.3",
                     status: "affected",
                     version: "6.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.1",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.6,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:U/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-256",
                     description: "Improper access control",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-13T08:41:46.337Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-21-141",
               url: "https://fortiguard.com/psirt/FG-IR-21-141",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.0.0 or above ",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-26204",
      datePublished: "2023-06-13T08:41:46.337Z",
      dateReserved: "2023-02-20T15:09:20.635Z",
      dateUpdated: "2024-10-22T20:45:34.996Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-23108
Vulnerability from cvelistv5
Published
2024-02-05 13:26
Modified
2024-08-01 22:51
Summary
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.1.0    7.1.1
Version: 7.0.0    7.0.2
Version: 6.7.0    6.7.8
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.2
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:7.1.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "7.1.1",
                        status: "affected",
                        version: "7.1.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:7.0.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "7.0.2",
                        status: "affected",
                        version: "7.0.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "6.7.8",
                        status: "affected",
                        version: "6.7.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "6.6.3",
                        status: "affected",
                        version: "6.6.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "6.5.2",
                        status: "affected",
                        version: "6.5.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "fortisiem",
                  vendor: "fortinet",
                  versions: [
                     {
                        lessThanOrEqual: "6.4.2",
                        status: "affected",
                        version: "6.4.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-23108",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-05-30T04:00:24.522935Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-20T17:06:40.889Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            references: [
               {
                  tags: [
                     "exploit",
                  ],
                  url: "https://github.com/horizon3ai/CVE-2024-23108",
               },
            ],
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:51:11.211Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-130",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-130",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.1.1",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.2",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.8",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.2",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.7,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:X/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-78",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-05T13:26:15.727Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-130",
               url: "https://fortiguard.com/psirt/FG-IR-23-130",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.1.2 or above  \nPlease upgrade to upcoming FortiSIEM version 7.2.0 or above  \nPlease upgrade to upcoming FortiSIEM version 7.0.3 or above  \nPlease upgrade to upcoming FortiSIEM version 6.7.9 or above  \nPlease upgrade to upcoming FortiSIEM version 6.6.5 or above  \nPlease upgrade to upcoming FortiSIEM version 6.5.3 or above  \nPlease upgrade to upcoming FortiSIEM version 6.4.4 or above  \n",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2024-23108",
      datePublished: "2024-02-05T13:26:15.727Z",
      dateReserved: "2024-01-11T16:29:07.979Z",
      dateUpdated: "2024-08-01T22:51:11.211Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2022-43949
Vulnerability from cvelistv5
Published
2023-06-13 08:41
Modified
2024-10-22 20:45
Summary
A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 6.7.0    6.7.1
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.1
Version: 6.4.0    6.4.2
Version: 6.3.0    6.3.3
Version: 6.2.0    6.2.1
Version: 6.1.0    6.1.2
Version: 5.4.0
Version: 5.3.0    5.3.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T13:47:05.398Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-22-259",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-22-259",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2022-43949",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-22T20:18:02.278116Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-22T20:45:58.544Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "6.7.1",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.1",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.2",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.3.3",
                     status: "affected",
                     version: "6.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.1",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A use of a broken or risky cryptographic algorithm [CWE-327]  in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-327",
                     description: "Information disclosure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-13T08:41:43.255Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-22-259",
               url: "https://fortiguard.com/psirt/FG-IR-22-259",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.0.0 or above Please upgrade to FortiSIEM version 6.7.2 or above ",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2022-43949",
      datePublished: "2023-06-13T08:41:43.255Z",
      dateReserved: "2022-10-27T07:40:06.589Z",
      dateUpdated: "2024-10-22T20:45:58.544Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-52969
Vulnerability from cvelistv5
Published
2025-01-14 14:08
Modified
2025-01-14 20:55
Summary
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiSIEM ersion 7.1.7 and below, version 7.1.0, version 7.0.3 and below, version 6.7.9 and below, 6.7.8, version 6.6.5 and below, version 6.5.3 and below, version 6.4.4 and below Update/Create Case feature may allow an authenticated attacker to extract database information via crafted requests.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.1.0    7.1.7
Version: 7.0.0    7.0.3
Version: 6.7.0    6.7.9
Version: 6.6.0    6.6.5
Version: 6.5.0    6.5.3
Version: 6.4.0    6.4.4
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-52969",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-01-14T15:15:11.758765Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-01-14T20:55:36.518Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [],
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.1.7",
                     status: "affected",
                     version: "7.1.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.3",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.7.9",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.5",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.3",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.4",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiSIEM ersion 7.1.7 and below, version 7.1.0, version 7.0.3 and below, version 6.7.9 and below, 6.7.8, version 6.6.5 and below, version 6.5.3 and below, version 6.4.4 and below Update/Create Case feature may allow an authenticated attacker to extract database information via crafted requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.7,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N/E:P/RL:X/RC:R",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-89",
                     description: "Information disclosure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-14T14:08:59.640Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.fortinet.com/psirt/FG-IR-24-417",
               url: "https://fortiguard.fortinet.com/psirt/FG-IR-24-417",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.2.0 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2024-52969",
      datePublished: "2025-01-14T14:08:59.640Z",
      dateReserved: "2024-11-18T13:36:52.466Z",
      dateUpdated: "2025-01-14T20:55:36.518Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2023-45585
Vulnerability from cvelistv5
Published
2023-11-14 18:05
Modified
2024-08-30 18:12
Summary
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.
Impacted products
Vendor Product Version
Fortinet FortiSIEM Version: 7.0.0
Version: 6.7.0    6.7.6
Version: 6.6.0    6.6.3
Version: 6.5.0    6.5.1
Version: 6.4.0    6.4.2
Version: 6.3.0    6.3.3
Version: 6.2.0    6.2.1
Version: 6.1.0    6.1.2
Version: 5.4.0
Version: 5.3.0    5.3.3
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T20:21:16.654Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-392",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-392",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-45585",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-30T18:12:26.659008Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-08-30T18:12:40.795Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiSIEM",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "7.0.0",
                  },
                  {
                     lessThanOrEqual: "6.7.6",
                     status: "affected",
                     version: "6.7.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.3",
                     status: "affected",
                     version: "6.6.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.5.1",
                     status: "affected",
                     version: "6.5.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.2",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.3.3",
                     status: "affected",
                     version: "6.3.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.1",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.2",
                     status: "affected",
                     version: "6.1.0",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "5.4.0",
                  },
                  {
                     lessThanOrEqual: "5.3.3",
                     status: "affected",
                     version: "5.3.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version  6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-532",
                     description: "Information disclosure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-11-14T18:05:44.008Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-392",
               url: "https://fortiguard.com/psirt/FG-IR-23-392",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiSIEM version 7.1.0 or above \nPlease upgrade to FortiSIEM version 7.0.1 or above \nPlease upgrade to FortiSIEM version 6.7.7 or above \nPlease upgrade to FortiSIEM version 6.6.4 or above \nPlease upgrade to FortiSIEM version 6.5.2 or above \nPlease upgrade to FortiSIEM version 6.4.3 or above \n",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-45585",
      datePublished: "2023-11-14T18:05:44.008Z",
      dateReserved: "2023-10-09T08:01:29.296Z",
      dateUpdated: "2024-08-30T18:12:40.795Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2020-01-28 01:15
Modified
2024-11-21 04:32
Summary
An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule.
Impacted products
Vendor Product Version
fortinet fortisiem *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A87978B-15D8-4FF4-B158-C2D8CDEB7C07",
                     versionEndIncluding: "5.2.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de Neutralización Inadecuada de Entrada en los parámetros description y title de un Programa de Mantenimiento de Dispositivo en FortiSIEM versión 5.2.5 y por debajo, puede permitir a un atacante autenticado remoto llevar a cabo un ataque de tipo Cross Site Scripting (XSS) Almacenado mediante la inyección de código JavaScript malicioso en el campo description de un programa de Mantenimiento de Dispositivo.",
      },
   ],
   id: "CVE-2019-17651",
   lastModified: "2024-11-21T04:32:42.353",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-01-28T01:15:11.050",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-19-197",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-19-197",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-13 09:15
Modified
2024-11-21 07:50
Summary
A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0258A88-352D-4F9A-894D-F7442CAFE461",
                     versionEndIncluding: "5.3.3",
                     versionStartIncluding: "5.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9FC4C46-F269-4635-80BE-BED292538FEF",
                     versionEndIncluding: "6.3.3",
                     versionStartIncluding: "6.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB301503-0ECB-4D21-B341-ACF0F302CF85",
                     versionEndIncluding: "6.6.3",
                     versionStartIncluding: "6.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20FD2D69-73DD-4EA4-ADE6-EB4BCFED7AC7",
                     versionEndIncluding: "6.7.5",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E43A1B-D4C5-4FFF-9D3E-00140023921E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F52E2B2-A3B1-493F-B092-77A2A44E855A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B16CB79-AC63-41EA-AE9A-D6030449ACD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "912BA146-D840-4855-8C47-AC3D5E6D0C4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51452B16-AB83-41D3-8779-3E1AEA818AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F453DE5-E31D-4BD1-8978-DD6D166045E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFFA27A5-0168-4261-9A04-D2DBB0A9946D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A391C353-BD26-4262-B86F-E3FBF8915DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD5BE55-0990-4646-ADA7-9A30981D4DF2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI.",
      },
   ],
   id: "CVE-2023-26204",
   lastModified: "2024-11-21T07:50:54.617",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 1.4,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-13T09:15:16.417",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-21-141",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-21-141",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-256",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-03-12 23:15
Modified
2024-11-21 04:32
Summary
A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link.
Impacted products
Vendor Product Version
fortinet fortisiem 5.2.5



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B114C6F-82AF-4ADF-B840-61851B9E39C9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en la interfaz de usuario de Fortinet FortiSIEM versión 5.2.5, podría permitir a un atacante no autenticado remoto llevar a cabo acciones arbitrarias usando una sesión de usuario autenticado, al persuadir a la víctima a seguir un enlace malicioso.",
      },
   ],
   id: "CVE-2019-17653",
   lastModified: "2024-11-21T04:32:42.577",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-03-12T23:15:11.703",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Broken Link",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-19-240",
      },
      {
         source: "nvd@nist.gov",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://fortiguard.com/psirt/%20FG-IR-19-240",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-19-240",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-352",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-04-17 15:29
Modified
2024-11-21 03:46
Summary
An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code.
Impacted products
Vendor Product Version
fortinet fortisiem *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C47F7C1E-EA58-41E9-87F9-7EE3F12E8B13",
                     versionEndIncluding: "5.2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de divulgación de información en Fortinet FortiSIEM versión 5.2.0 y versiones anteriores, revela la contraseña de texto plano del servidor LDAP por medio del código fuente HTML.",
      },
   ],
   id: "CVE-2018-13378",
   lastModified: "2024-11-21T03:46:59.137",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-04-17T15:29:00.437",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-18-382",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-18-382",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 18:15
Modified
2024-11-21 08:09
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D52F2E6B-9A88-4DB4-8CB9-09A3AFFF1685",
                     versionEndIncluding: "5.1.3",
                     versionStartIncluding: "5.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:4.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A44DC3AB-BF8F-4818-A1B2-413C28E3247E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:4.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9070EE8F-690A-4A25-A04F-25DB9AC2525A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:4.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFC6DCBF-8725-42AD-80A6-4D8BBA8B594A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F62A1-10E7-4AFF-8725-2A4425179CA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9040EA7-86F7-4553-A0C8-A6C76B0C9E75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE69B846-3B23-401D-98D0-46DC976A25FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4C2A49-23CB-4104-A345-46B3B4A29A24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B114C6F-82AF-4ADF-B840-61851B9E39C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C759185-C780-426F-8185-258C88A924A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B669A735-2DC0-434A-9CE1-0232F62848D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A5FA2FC-419D-46E8-ACE3-929E5B39F1AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFA6A6A3-3847-4C0F-8415-7F036C86000D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "783AECE8-0875-4FDF-8885-E3665798CDEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E99CB1B-C3EA-4C7C-8484-9192BC95403A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7EC060D-B4E4-46B7-BB4B-6DDEF8094C16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E43A1B-D4C5-4FFF-9D3E-00140023921E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests.",
      },
      {
         lang: "es",
         value: "Una neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiSIEM versión 5.4.0 y 5.3.0 a 5.3.3 y 5.2.5 a 5.2.8 y 5.2.1 a 5.2.2 y 5.1.0 a 5.1.3 y 5.0.0 a 5.0.1 y 4.10.0 y 4.9.0 y 4.7.2 permiten a un atacante ejecutar código o comandos no autorizados a través de solicitudes API manipuladas.",
      },
   ],
   id: "CVE-2023-36553",
   lastModified: "2024-11-21T08:09:55.190",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T18:15:48.093",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-135",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-135",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 18:15
Modified
2024-11-21 08:27
Summary
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0258A88-352D-4F9A-894D-F7442CAFE461",
                     versionEndIncluding: "5.3.3",
                     versionStartIncluding: "5.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E6F78C3-BFAB-446E-9E85-B2C38F35FED2",
                     versionEndIncluding: "6.7.6",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E43A1B-D4C5-4FFF-9D3E-00140023921E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F52E2B2-A3B1-493F-B092-77A2A44E855A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B16CB79-AC63-41EA-AE9A-D6030449ACD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "912BA146-D840-4855-8C47-AC3D5E6D0C4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51452B16-AB83-41D3-8779-3E1AEA818AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F453DE5-E31D-4BD1-8978-DD6D166045E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2151BD68-91C5-44F5-8DB7-C04319FDFFB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC87151B-7E6D-45C6-8592-64F70E5BE459",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7DCDFD3-CE9F-487B-87B6-9E673B7BAFAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA88818A-DCA6-45EF-977D-ED7CA3693791",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFFA27A5-0168-4261-9A04-D2DBB0A9946D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A391C353-BD26-4262-B86F-E3FBF8915DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD5BE55-0990-4646-ADA7-9A30981D4DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46426B1-B144-432C-8BA6-317617EBC110",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6590962C-FF61-4237-8F30-33B15829C8B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B5BFCB-DFD4-4519-A2AF-1FABA58FA04D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "50635727-53A0-476F-BB86-A47CDAA3D45B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB28BA6-45B6-422B-9901-300B6024F703",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version  6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.",
      },
      {
         lang: "es",
         value: "Una inserción de información confidencial en la vulnerabilidad del archivo de registro [CWE-532] en FortiSIEM versión 7.0.0, versión 6.7.6 e inferior, versión 6.6.3 e inferior, versión 6.5.1 e inferior, versión 6.4.2 e inferior, versión 6.3.3 y anteriores, versión 6.2.1 y siguientes, versión 6.1.2 y siguientes, versión 5.4.0, versión 5.3.3 y siguientes pueden permitir que un usuario autenticado vea una contraseña cifrada de ElasticSearch a través de archivos de registro de depuración generados cuando FortiSIEM está configurado con ElasticSearch Event Storage.",
      },
   ],
   id: "CVE-2023-45585",
   lastModified: "2024-11-21T08:27:00.600",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 2.3,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 1.4,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 3.3,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T18:15:55.617",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-392",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-392",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-532",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 14:15
Modified
2024-11-21 08:56
Summary
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23FA8F49-E85A-402F-91CF-293EF5C60B29",
                     versionEndIncluding: "6.4.2",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE42081E-AF1E-4FEB-9570-324A7FB8A9A6",
                     versionEndIncluding: "6.5.2",
                     versionStartIncluding: "6.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB301503-0ECB-4D21-B341-ACF0F302CF85",
                     versionEndIncluding: "6.6.3",
                     versionStartIncluding: "6.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "71C5093F-7D96-46B5-8DF7-068877E71F67",
                     versionEndIncluding: "6.7.8",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFE7DE50-FC7B-4F64-8324-F6BF302B4667",
                     versionEndIncluding: "7.0.2",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:7.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C9E32B0-8C95-40D7-B31F-54626D1F7AFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:7.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0016873D-3247-4B9A-9519-46C88EEBB3BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.",
      },
      {
         lang: "es",
         value: "Una neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiSIEM versión 7.1.0 a 7.1.1 y 7.0.0 a 7.0.2 y 6.7.0 a 6.7.8 y 6.6.0 a través 6.6.3 y 6.5.0 a 6.5.2 y 6.4.0 a 6.4.2 permiten al atacante ejecutar código o comandos no autorizados a través de solicitudes API manipuladas.",
      },
   ],
   id: "CVE-2024-23108",
   lastModified: "2024-11-21T08:56:56.783",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T14:15:57.827",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-130",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-130",
      },
      {
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         url: "https://github.com/horizon3ai/CVE-2024-23108",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-11-14 18:15
Modified
2024-11-21 08:21
Summary
An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version 7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.
Impacted products
Vendor Product Version
fortinet fortisiem *
fortinet fortisiem 7.0.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20FD2D69-73DD-4EA4-ADE6-EB4BCFED7AC7",
                     versionEndIncluding: "6.7.5",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB28BA6-45B6-422B-9901-300B6024F703",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An exposure of sensitive information to an unauthorized actor [CWE-200] in FortiSIEM version  7.0.0 and before 6.7.5 may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.",
      },
      {
         lang: "es",
         value: "Una exposición de información confidencial a un actor no autorizado [CWE-200] en FortiSIEM versión 7.0.0 y anteriores a 6.7.5 puede permitir que un atacante con acceso a los registros del agente de Windows obtenga la contraseña del agente de Windows mediante la búsqueda en los registros.",
      },
   ],
   id: "CVE-2023-41676",
   lastModified: "2024-11-21T08:21:28.030",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-11-14T18:15:52.590",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-290",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-290",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2022-11-02 12:15
Modified
2024-11-21 06:53
Summary
A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D52F2E6B-9A88-4DB4-8CB9-09A3AFFF1685",
                     versionEndIncluding: "5.1.3",
                     versionStartIncluding: "5.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5F193AB-AC8D-4889-B34D-DEAF83E40B71",
                     versionEndIncluding: "5.2.8",
                     versionStartIncluding: "5.2.5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0258A88-352D-4F9A-894D-F7442CAFE461",
                     versionEndIncluding: "5.3.3",
                     versionStartIncluding: "5.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "24480037-F5CE-4CCE-800D-8C707B7F36AF",
                     versionEndIncluding: "6.1.2",
                     versionStartIncluding: "6.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9FC4C46-F269-4635-80BE-BED292538FEF",
                     versionEndIncluding: "6.3.3",
                     versionStartIncluding: "6.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F62A1-10E7-4AFF-8725-2A4425179CA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9040EA7-86F7-4553-A0C8-A6C76B0C9E75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE69B846-3B23-401D-98D0-46DC976A25FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4C2A49-23CB-4104-A345-46B3B4A29A24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E43A1B-D4C5-4FFF-9D3E-00140023921E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51452B16-AB83-41D3-8779-3E1AEA818AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F453DE5-E31D-4BD1-8978-DD6D166045E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFFA27A5-0168-4261-9A04-D2DBB0A9946D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de autenticación incorrecta en Fortinet FortiSIEM anterior a 6.5.0 permite a un atacante local con acceso CLI realizar operaciones en el servidor Glassfish directamente a través de una contraseña codificada.",
      },
   ],
   id: "CVE-2022-26119",
   lastModified: "2024-11-21T06:53:28.180",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2022-11-02T12:15:50.427",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-22-064",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-22-064",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-01-23 17:15
Modified
2024-11-21 04:30
Severity ?
Summary
A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials.
Impacted products
Vendor Product Version
fortinet fortisiem *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76E3B8F9-16E5-40AA-94E8-D4C1DA9105C0",
                     versionEndIncluding: "5.2.5",
                     versionStartIncluding: "5.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de contraseña embebida en el componente base de datos de Fortinet FortiSIEM versión 5.2.5 y por debajo, puede permitir a atacantes acceder a la base de datos del dispositivo mediante el uso de credenciales estáticas.",
      },
   ],
   id: "CVE-2019-16153",
   lastModified: "2024-11-21T04:30:09.460",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-01-23T17:15:11.830",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-19-195",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-19-195",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-798",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-10-10 17:15
Modified
2024-11-21 08:07
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB301503-0ECB-4D21-B341-ACF0F302CF85",
                     versionEndIncluding: "6.6.3",
                     versionStartIncluding: "6.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "20FD2D69-73DD-4EA4-ADE6-EB4BCFED7AC7",
                     versionEndIncluding: "6.7.5",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFFA27A5-0168-4261-9A04-D2DBB0A9946D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A391C353-BD26-4262-B86F-E3FBF8915DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD5BE55-0990-4646-ADA7-9A30981D4DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:7.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB28BA6-45B6-422B-9901-300B6024F703",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.",
      },
      {
         lang: "es",
         value: "Una neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiSIEM versión 7.0.0 y 6.7.0 a 6.7.5 y 6.6.0 a 6.6.3 y 6.5.0 a 6.5.1 y Las versiones 6.4.0 a 6.4.2 permiten al atacante ejecutar código o comandos no autorizados a través de solicitudes API manipuladas.",
      },
   ],
   id: "CVE-2023-34992",
   lastModified: "2024-11-21T08:07:47.417",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-10-10T17:15:11.607",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-130",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-130",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2025-01-14 14:15
Modified
2025-02-03 22:01
Summary
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiSIEM ersion 7.1.7 and below, version 7.1.0, version 7.0.3 and below, version 6.7.9 and below, 6.7.8, version 6.6.5 and below, version 6.5.3 and below, version 6.4.4 and below Update/Create Case feature may allow an authenticated attacker to extract database information via crafted requests.
Impacted products
Vendor Product Version
fortinet fortisiem *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "212DD268-6A3F-4F12-A935-D6BA7B5DD4F1",
                     versionEndIncluding: "7.1.7",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiSIEM ersion 7.1.7 and below, version 7.1.0, version 7.0.3 and below, version 6.7.9 and below, 6.7.8, version 6.6.5 and below, version 6.5.3 and below, version 6.4.4 and below Update/Create Case feature may allow an authenticated attacker to extract database information via crafted requests.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de neutralización inadecuada de elementos especiales utilizados en un comando SQL ('Inyección SQL') [CWE-89] en FortiSIEM versión 7.1.7 y anteriores, versión 7.1.0, versión 7.0.3 y anteriores, versión 6.7.9 y anteriores, 6.7.8, versión 6.6.5 y anteriores, versión 6.5.3 y anteriores, versión 6.4.4 y anteriores La función Actualizar/Crear caso puede permitir que un atacante autenticado extraiga información de la base de datos a través de solicitudes manipuladas.",
      },
   ],
   id: "CVE-2024-52969",
   lastModified: "2025-02-03T22:01:44.330",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.1,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 1.4,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2025-01-14T14:15:34.123",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.fortinet.com/psirt/FG-IR-24-417",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-01-07 19:15
Modified
2024-11-21 04:46
Summary
An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code.
Impacted products
Vendor Product Version
fortinet fortisiem *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "86F84B70-FF2D-4A94-96C3-49BDC4FA68CD",
                     versionEndExcluding: "5.2.5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de exposición de información en el formulario del perfil de autenticación externo de FortiSIEM versiones 5.2.2 y anteriores, puede permitir a un atacante autenticado recuperar la contraseña de autenticación externa por medio del código fuente HTML.",
      },
   ],
   id: "CVE-2019-6700",
   lastModified: "2024-11-21T04:46:58.753",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-01-07T19:15:10.993",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-19-100",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-19-100",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-13 09:15
Modified
2024-11-21 07:25
Summary
An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D52F2E6B-9A88-4DB4-8CB9-09A3AFFF1685",
                     versionEndIncluding: "5.1.3",
                     versionStartIncluding: "5.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0258A88-352D-4F9A-894D-F7442CAFE461",
                     versionEndIncluding: "5.3.3",
                     versionStartIncluding: "5.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9FC4C46-F269-4635-80BE-BED292538FEF",
                     versionEndIncluding: "6.3.3",
                     versionStartIncluding: "6.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE69B846-3B23-401D-98D0-46DC976A25FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE4C2A49-23CB-4104-A345-46B3B4A29A24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B114C6F-82AF-4ADF-B840-61851B9E39C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C759185-C780-426F-8185-258C88A924A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "B669A735-2DC0-434A-9CE1-0232F62848D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A5FA2FC-419D-46E8-ACE3-929E5B39F1AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E43A1B-D4C5-4FFF-9D3E-00140023921E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F52E2B2-A3B1-493F-B092-77A2A44E855A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B16CB79-AC63-41EA-AE9A-D6030449ACD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "912BA146-D840-4855-8C47-AC3D5E6D0C4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51452B16-AB83-41D3-8779-3E1AEA818AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F453DE5-E31D-4BD1-8978-DD6D166045E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFFA27A5-0168-4261-9A04-D2DBB0A9946D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A391C353-BD26-4262-B86F-E3FBF8915DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD5BE55-0990-4646-ADA7-9A30981D4DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F46426B1-B144-432C-8BA6-317617EBC110",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6590962C-FF61-4237-8F30-33B15829C8B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B5BFCB-DFD4-4519-A2AF-1FABA58FA04D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "50635727-53A0-476F-BB86-A47CDAA3D45B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0534E1D8-8099-4FF1-A5A9-36CCA8F7956A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints.",
      },
   ],
   id: "CVE-2022-42478",
   lastModified: "2024-11-21T07:25:03.170",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.2,
            impactScore: 5.9,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-13T09:15:15.653",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-22-258",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-22-258",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-307",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-307",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-02 19:15
Modified
2024-11-21 06:25
Summary
A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts
Impacted products
Vendor Product Version
fortinet fortisiem *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B052CC93-F0C7-4094-B859-42DF247C9521",
                     versionEndIncluding: "4.1.4",
                     versionStartIncluding: "3.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts",
      },
      {
         lang: "es",
         value: "Una administración inapropiada de privilegios en Fortinet FortiSIEM Windows Agent versión 4.1.4 y por debajo, permite a un atacante ejecutar código o comandos privilegiados por medio de scripts powershell",
      },
   ],
   id: "CVE-2021-41022",
   lastModified: "2024-11-21T06:25:17.117",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-02T19:15:08.073",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-21-176",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-21-176",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-269",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-06-13 09:15
Modified
2024-11-21 07:27
Summary
A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0258A88-352D-4F9A-894D-F7442CAFE461",
                     versionEndIncluding: "5.3.3",
                     versionStartIncluding: "5.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9FC4C46-F269-4635-80BE-BED292538FEF",
                     versionEndIncluding: "6.3.3",
                     versionStartIncluding: "6.3.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB301503-0ECB-4D21-B341-ACF0F302CF85",
                     versionEndIncluding: "6.6.3",
                     versionStartIncluding: "6.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E43A1B-D4C5-4FFF-9D3E-00140023921E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F52E2B2-A3B1-493F-B092-77A2A44E855A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B16CB79-AC63-41EA-AE9A-D6030449ACD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "912BA146-D840-4855-8C47-AC3D5E6D0C4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51452B16-AB83-41D3-8779-3E1AEA818AD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F453DE5-E31D-4BD1-8978-DD6D166045E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C48AC74D-9FBE-4194-9BE8-FD2D6A0EC788",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFFA27A5-0168-4261-9A04-D2DBB0A9946D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2035DFA0-FF3A-4BBF-ABFE-0E310A7C668B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A391C353-BD26-4262-B86F-E3FBF8915DCA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD5BE55-0990-4646-ADA7-9A30981D4DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0534E1D8-8099-4FF1-A5A9-36CCA8F7956A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:6.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E6B1E1-6527-4A64-BB77-0505E58C2F36",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A use of a broken or risky cryptographic algorithm [CWE-327]  in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.",
      },
   ],
   id: "CVE-2022-43949",
   lastModified: "2024-11-21T07:27:23.920",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 6.2,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.5,
            impactScore: 3.6,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-13T09:15:16.027",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-22-259",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-22-259",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-327",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-327",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-11-02 19:15
Modified
2024-11-21 06:25
Summary
A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files
Impacted products
Vendor Product Version
fortinet fortisiem *
microsoft windows -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B052CC93-F0C7-4094-B859-42DF247C9521",
                     versionEndIncluding: "4.1.4",
                     versionStartIncluding: "3.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files",
      },
      {
         lang: "es",
         value: "Un almacenamiento desprotegido de credenciales en Fortinet FortiSIEM Windows Agent versión 4.1.4 y por debajo, permite a un usuario autenticado revelar la contraseña del agente debido al almacenamiento de credenciales en texto plano en los archivos de registro",
      },
   ],
   id: "CVE-2021-41023",
   lastModified: "2024-11-21T06:25:17.277",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-11-02T19:15:08.120",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-21-175",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/advisory/FG-IR-21-175",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-522",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-05 14:15
Modified
2024-11-21 08:56
Summary
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23FA8F49-E85A-402F-91CF-293EF5C60B29",
                     versionEndIncluding: "6.4.2",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE42081E-AF1E-4FEB-9570-324A7FB8A9A6",
                     versionEndIncluding: "6.5.2",
                     versionStartIncluding: "6.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB301503-0ECB-4D21-B341-ACF0F302CF85",
                     versionEndIncluding: "6.6.3",
                     versionStartIncluding: "6.6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "71C5093F-7D96-46B5-8DF7-068877E71F67",
                     versionEndIncluding: "6.7.8",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFE7DE50-FC7B-4F64-8324-F6BF302B4667",
                     versionEndIncluding: "7.0.2",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:7.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C9E32B0-8C95-40D7-B31F-54626D1F7AFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:7.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0016873D-3247-4B9A-9519-46C88EEBB3BF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.",
      },
      {
         lang: "es",
         value: "Una neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiSIEM versión 7.1.0 a 7.1.1 y 7.0.0 a 7.0.2 y 6.7.0 a 6.7.8 y 6.6.0 a través 6.6.3 y 6.5.0 a 6.5.2 y 6.4.0 a 6.4.2 permiten al atacante ejecutar código o comandos no autorizados a través de solicitudes API manipuladas.",
      },
   ],
   id: "CVE-2024-23109",
   lastModified: "2024-11-21T08:56:56.940",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 10,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 6,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-05T14:15:59.100",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-130",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-130",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-09-13 13:15
Modified
2024-11-21 08:09
Summary
A exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.5 allows attacker to information disclosure via a crafted http request.
Impacted products
Vendor Product Version
fortinet fortisiem *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26117F45-D8BA-4BBE-996D-D2799A625ADA",
                     versionEndExcluding: "6.7.6",
                     versionStartIncluding: "6.7.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.5 allows attacker to information disclosure via a crafted http request.",
      },
      {
         lang: "es",
         value: "La exposición de información sensible a un actor no autorizado en Fortinet FortiSIEM versión 6.7.0 a 6.7.5 permite al atacante revelar información a través de una solicitud http manipulada.",
      },
   ],
   id: "CVE-2023-36551",
   lastModified: "2024-11-21T08:09:55.070",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-09-13T13:15:08.697",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-126",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-126",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-202003-0839
Vulnerability from variot

A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link. Fortinet FortiSIEM Exists in a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. The vulnerability stems from the WEB application not adequately verifying that the request is from a trusted user. An attacker could exploit this vulnerability to send unexpected requests to the server through an affected client

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0839",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1.8,
            vendor: "fortinet",
            version: "5.2.5",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:5.2.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
      ],
   },
   cve: "CVE-2019-17653",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 6.8,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "JVNDB-2019-014972",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-149921",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 8.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "JVNDB-2019-014972",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-17653",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "JVNDB-2019-014972",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202003-808",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-149921",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149921",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A Cross-Site Request Forgery (CSRF) vulnerability in the user interface of Fortinet FortiSIEM 5.2.5 could allow a remote, unauthenticated attacker to perform arbitrary actions using an authenticated user's session by persuading the victim to follow a malicious link. Fortinet FortiSIEM Exists in a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. The vulnerability stems from the WEB application not adequately verifying that the request is from a trusted user. An attacker could exploit this vulnerability to send unexpected requests to the server through an affected client",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "VULHUB",
            id: "VHN-149921",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-17653",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0918",
            trust: 0.6,
         },
         {
            db: "CNVD",
            id: "CNVD-2020-19914",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-149921",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149921",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
   },
   id: "VAR-202003-0839",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149921",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T12:35:40.003000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "FG-IR-19-240",
            trust: 0.8,
            url: "https://fortiguard.com/psirt/%20fg-ir-19-240",
         },
         {
            title: "Fortinet FortiSIEM Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=112328",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-352",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149921",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://fortiguard.com/psirt/fg-ir-19-240",
         },
         {
            trust: 1.6,
            url: "https://fortiguard.com/psirt/%20fg-ir-19-240",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-17653",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-17653",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0918/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149921",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-149921",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            db: "NVD",
            id: "CVE-2019-17653",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-03-12T00:00:00",
            db: "VULHUB",
            id: "VHN-149921",
         },
         {
            date: "2020-03-31T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            date: "2020-03-12T23:15:11.703000",
            db: "NVD",
            id: "CVE-2019-17653",
         },
         {
            date: "2020-03-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-03-18T00:00:00",
            db: "VULHUB",
            id: "VHN-149921",
         },
         {
            date: "2020-03-31T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
         {
            date: "2020-03-18T14:25:57.503000",
            db: "NVD",
            id: "CVE-2019-17653",
         },
         {
            date: "2020-03-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Fortinet FortiSIEM Cross-site request forgery vulnerability in",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014972",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "cross-site request forgery",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202003-808",
         },
      ],
      trust: 0.6,
   },
}

var-201904-0595
Vulnerability from variot

An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code. Fortinet FortiSIEM Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet Security Information & Event Management System (FortiSIEM) is a set of security information and event management system of Fortinet Corporation. Security event management of assets such as the system's infrastructure, applications, and virtual machines. The admin portal in Fortinet FortiSIEM 5.2.0 and earlier versions has an information disclosure vulnerability, which is caused by a configuration error in the network system or product during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0595",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1.8,
            vendor: "fortinet",
            version: "5.2.0",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "5.2.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
      ],
   },
   cve: "CVE-2018-13378",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2018-13378",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-123431",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.2,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2018-13378",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2018-13378",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201904-001",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-123431",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-123431",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code. Fortinet FortiSIEM Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet Security Information & Event Management System (FortiSIEM) is a set of security information and event management system of Fortinet Corporation. Security event management of assets such as the system's infrastructure, applications, and virtual machines. The admin portal in Fortinet FortiSIEM 5.2.0 and earlier versions has an information disclosure vulnerability, which is caused by a configuration error in the network system or product during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components",
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "VULHUB",
            id: "VHN-123431",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-13378",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.1090",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-123431",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-123431",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
   },
   id: "VAR-201904-0595",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-123431",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T12:50:19.913000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "FG-IR-18-382",
            trust: 0.8,
            url: "https://fortiguard.com/psirt/fg-ir-18-382",
         },
         {
            title: "Fortinet Security Information & Event Management System Repair measures for information disclosure vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=90917",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-123431",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://fortiguard.com/advisory/fg-ir-18-382",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-13378",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13378",
         },
         {
            trust: 0.6,
            url: "https://fortiguard.com/psirt/fg-ir-18-382",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/78222",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-123431",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-123431",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            db: "NVD",
            id: "CVE-2018-13378",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-04-17T00:00:00",
            db: "VULHUB",
            id: "VHN-123431",
         },
         {
            date: "2019-05-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            date: "2019-04-17T15:29:00.437000",
            db: "NVD",
            id: "CVE-2018-13378",
         },
         {
            date: "2019-04-01T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-04-17T00:00:00",
            db: "VULHUB",
            id: "VHN-123431",
         },
         {
            date: "2019-05-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
         {
            date: "2019-04-17T18:06:24.997000",
            db: "NVD",
            id: "CVE-2018-13378",
         },
         {
            date: "2019-04-19T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Fortinet FortiSIEM Vulnerable to information disclosure",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-015278",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201904-001",
         },
      ],
      trust: 0.6,
   },
}

var-202211-0062
Vulnerability from variot

A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202211-0062",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.1",
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.1.2",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.0",
         },
         {
            model: "fortisiem",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.1.0",
         },
         {
            model: "fortisiem",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.1.0",
         },
         {
            model: "fortisiem",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.3.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "5.4.0",
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "5.2.8",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "5.2.2",
         },
         {
            model: "fortisiem",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "6.3.0",
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "6.3.3",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.4.0",
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "5.1.3",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "5.3.3",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 1,
            vendor: "fortinet",
            version: "6.2.1",
         },
         {
            model: "fortisiem",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.2.5",
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "6.3.3",
                        versionStartIncluding: "6.3.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "6.1.2",
                        versionStartIncluding: "6.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "5.3.3",
                        versionStartIncluding: "5.3.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "5.2.8",
                        versionStartIncluding: "5.2.5",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "5.1.3",
                        versionStartIncluding: "5.1.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:5.0.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:5.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
      ],
   },
   cve: "CVE-2022-26119",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 2,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2022-26119",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "psirt@fortinet.com",
                  id: "CVE-2022-26119",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202211-1923",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password",
      sources: [
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            db: "VULHUB",
            id: "VHN-416880",
         },
      ],
      trust: 0.99,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2022-26119",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-416880",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-416880",
         },
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
   },
   id: "VAR-202211-0062",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-416880",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:00:30.228000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Fortinet FortiSIEM Remediation measures for authorization problem vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=213039",
         },
      ],
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-798",
            trust: 1,
         },
         {
            problemtype: "CWE-287",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-416880",
         },
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://fortiguard.com/psirt/fg-ir-22-064",
         },
         {
            trust: 0.6,
            url: "https://cxsecurity.com/cveshow/cve-2022-26119/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-416880",
         },
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-416880",
         },
         {
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-11-02T00:00:00",
            db: "VULHUB",
            id: "VHN-416880",
         },
         {
            date: "2022-11-02T12:15:50.427000",
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            date: "2022-11-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-11-03T00:00:00",
            db: "VULHUB",
            id: "VHN-416880",
         },
         {
            date: "2023-08-08T14:21:49.707000",
            db: "NVD",
            id: "CVE-2022-26119",
         },
         {
            date: "2022-11-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Fortinet FortiSIEM Authorization problem vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202211-1923",
         },
      ],
      trust: 0.6,
   },
}

var-202001-0176
Vulnerability from variot

An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code. FortiSIEM Contains a vulnerability related to insufficient protection of credentials.Information may be obtained. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. An information disclosure vulnerability exists in Fortinet FortiSIEM 5.2.2 and earlier versions. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0176",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fortisiem",
            scope: "lt",
            trust: 1,
            vendor: "fortinet",
            version: "5.2.5",
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 0.8,
            vendor: "fortinet",
            version: "5.2.2",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "4.10.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.2",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.0",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.2.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
      ],
   },
   cve: "CVE-2019-6700",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2019-6700",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8,
                  id: "VHN-158135",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 6.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2019-6700",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-6700",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201910-519",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-158135",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-158135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code. FortiSIEM Contains a vulnerability related to insufficient protection of credentials.Information may be obtained. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. An information disclosure vulnerability exists in Fortinet FortiSIEM 5.2.2 and earlier versions. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "VULHUB",
            id: "VHN-158135",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-6700",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.3781",
            trust: 0.6,
         },
         {
            db: "CNVD",
            id: "CNVD-2020-04291",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-158135",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-158135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   id: "VAR-202001-0176",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-158135",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:07:47.020000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "FG-IR-19-100",
            trust: 0.8,
            url: "https://fortiguard.com/psirt/fg-ir-19-100",
         },
         {
            title: "Fortinet FortiSIEM Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=99167",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-522",
            trust: 1.9,
         },
         {
            problemtype: "CWE-200",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-158135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://fortiguard.com/advisory/fg-ir-19-100",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-6700",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6700",
         },
         {
            trust: 0.6,
            url: "https://fortiguard.com/psirt/fg-ir-19-100",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.3781/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-158135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-158135",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-07T00:00:00",
            db: "VULHUB",
            id: "VHN-158135",
         },
         {
            date: "2020-01-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            date: "2020-01-07T19:15:10.993000",
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            date: "2019-10-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-08T00:00:00",
            db: "VULHUB",
            id: "VHN-158135",
         },
         {
            date: "2020-01-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
         {
            date: "2021-07-21T11:39:23.747000",
            db: "NVD",
            id: "CVE-2019-6700",
         },
         {
            date: "2020-01-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "FortiSIEM Vulnerable to insufficient protection of credentials",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-013880",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201910-519",
         },
      ],
      trust: 0.6,
   },
}

var-202001-0590
Vulnerability from variot

An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule. FortiSIEM Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. A cross-site scripting vulnerability exists in Fortinet FortiSIEM 5.2.5 and earlier versions. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0590",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "5.2.5",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.8,
            vendor: "フォーティネット",
            version: null,
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 0.8,
            vendor: "フォーティネット",
            version: "5.2.5",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "4.10.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.5",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.2",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.0",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "5.2.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
      ],
   },
   cve: "CVE-2019-17651",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "Single",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 3.5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2019-17651",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Low",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:S/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 6.8,
                  id: "VHN-149919",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:S/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  exploitabilityScore: 2.3,
                  impactScore: 2.7,
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.4,
                  baseSeverity: "Medium",
                  confidentialityImpact: "Low",
                  exploitabilityScore: null,
                  id: "CVE-2019-17651",
                  impactScore: null,
                  integrityImpact: "Low",
                  privilegesRequired: "Low",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-17651",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202001-1206",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-149919",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149919",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule. FortiSIEM Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. A cross-site scripting vulnerability exists in Fortinet FortiSIEM 5.2.5 and earlier versions. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "VULHUB",
            id: "VHN-149919",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-17651",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0319",
            trust: 0.6,
         },
         {
            db: "CNVD",
            id: "CNVD-2020-04930",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-149919",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149919",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   id: "VAR-202001-0590",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149919",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:33:13.101000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "FG-IR-19-197",
            trust: 0.8,
            url: "https://fortiguard.com/psirt/fg-ir-19-197",
         },
         {
            title: "Fortinet FortiSIEM Fixes for cross-site scripting vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=109321",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-79",
            trust: 1.1,
         },
         {
            problemtype: "Cross-site scripting (CWE-79) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149919",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://fortiguard.com/psirt/fg-ir-19-197",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-17651",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0319/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-149919",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-149919",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-28T00:00:00",
            db: "VULHUB",
            id: "VHN-149919",
         },
         {
            date: "2020-02-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            date: "2020-01-28T01:15:11.050000",
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            date: "2020-01-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-29T00:00:00",
            db: "VULHUB",
            id: "VHN-149919",
         },
         {
            date: "2020-02-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
         {
            date: "2020-01-29T20:10:10.883000",
            db: "NVD",
            id: "CVE-2019-17651",
         },
         {
            date: "2020-02-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "FortiSIEM  Vulnerable to cross-site scripting",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014309",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "XSS",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202001-1206",
         },
      ],
      trust: 0.6,
   },
}

var-202001-0503
Vulnerability from variot

A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials. Fortinet FortiSIEM Contains a vulnerability involving the use of hard-coded credentials.Information is acquired, information is falsified, and denial of service (DoS) May be in a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0503",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "fortisiem",
            scope: "lte",
            trust: 1,
            vendor: "fortinet",
            version: "5.2.5",
         },
         {
            model: "fortisiem",
            scope: "gte",
            trust: 1,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.8,
            vendor: "フォーティネット",
            version: null,
         },
         {
            model: "fortisiem",
            scope: "lte",
            trust: 0.8,
            vendor: "フォーティネット",
            version: "5.2.5",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.0.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.5",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.2",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.2.1",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.0.0",
         },
         {
            model: "fortisiem",
            scope: "eq",
            trust: 0.6,
            vendor: "fortinet",
            version: "5.1.0",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "5.2.5",
                        versionStartIncluding: "5.0.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
      ],
   },
   cve: "CVE-2019-16153",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 7.5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2019-16153",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-148271",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 3.9,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 9.8,
                  baseSeverity: "Critical",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2019-16153",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-16153",
                  trust: 1.8,
                  value: "CRITICAL",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202001-509",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-148271",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148271",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A hard-coded password vulnerability in the Fortinet FortiSIEM database component version 5.2.5 and below may allow attackers to access the device database via the use of static credentials. Fortinet FortiSIEM Contains a vulnerability involving the use of hard-coded credentials.Information is acquired, information is falsified, and denial of service (DoS) May be in a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "VULHUB",
            id: "VHN-148271",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-16153",
            trust: 2.5,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
            trust: 0.8,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0133",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-148271",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148271",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   id: "VAR-202001-0503",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148271",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:52:04.948000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "FG-IR-19-195",
            trust: 0.8,
            url: "https://fortiguard.com/advisory/fg-ir-19-195",
         },
         {
            title: "Fortinet FortiSIEM Remediation of resource management error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=109201",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-798",
            trust: 1.1,
         },
         {
            problemtype: "Using hard-coded credentials (CWE-798) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148271",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://fortiguard.com/advisory/fg-ir-19-195",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-16153",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0133/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-148271",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-148271",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-23T00:00:00",
            db: "VULHUB",
            id: "VHN-148271",
         },
         {
            date: "2020-02-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            date: "2020-01-23T17:15:11.830000",
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            date: "2020-01-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-01-27T00:00:00",
            db: "VULHUB",
            id: "VHN-148271",
         },
         {
            date: "2020-02-07T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
         {
            date: "2020-01-27T14:53:53.777000",
            db: "NVD",
            id: "CVE-2019-16153",
         },
         {
            date: "2020-03-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Fortinet FortiSIEM  Vulnerable to use of hard-coded credentials",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2019-014251",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "trust management problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202001-509",
         },
      ],
      trust: 0.6,
   },
}