CVE-2019-17659 (GCVE-0-2019-17659)
Vulnerability from cvelistv5 – Published: 2025-03-17 13:06 – Updated: 2025-03-17 13:35
VLAI?
Summary
A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
Severity ?
CWE
- CWE-798 - Improper access control
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-17659",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-17T13:35:01.135210Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-17T13:35:08.816Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [],
"defaultStatus": "unaffected",
"product": "FortiSIEM",
"vendor": "Fortinet",
"versions": [
{
"status": "affected",
"version": "5.2.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user \"tunneluser\" by leveraging knowledge of the private key from another installation or a firmware image."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:X/RC:X",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-17T13:06:07.828Z",
"orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"shortName": "fortinet"
},
"references": [
{
"name": "https://fortiguard.fortinet.com/psirt/FG-IR-19-296",
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-19-296"
}
],
"solutions": [
{
"lang": "en",
"value": "Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. \r\nWorkaround (for FortiSIEM version 5.2.6 and lower): \r\nCustomers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999 by following the steps below :\r\n1. SSH to the Supervisor node as the root user.\r\n2. Remove tunneluser SSH configuration file to disable listening on port 19999:\r\nrm -f /etc/ssh/sshd_config.tunneluser\r\necho rm -f /etc/ssh/sshd_config.tunneluser \u003e\u003e /etc/init.d/phProvision.sh\r\n3. Then terminate sshd running on TCP Port 19999 as follows:\r\npkill -f /usr/sbin/sshd -p 19999\r\n4.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account:\r\nrm -f /opt/phoenix/deployment/id_rsa.pub.tunneluser\r\nrm -f /home/tunneluser/.ssh/authorized_keys\r\nrm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsa\r\nCustomers are also advised to disable \"tunneluser\" SSH access on port 22 by following the steps bwlow:\r\n1. SSH to the Supervisor node as the root user.\r\n2. Add/edit the following line in sshd_config file: \r\necho DenyUsers tunneluser \u003e\u003e /etc/ssh/sshd_config\r\n3. service sshd restart"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"assignerShortName": "fortinet",
"cveId": "CVE-2019-17659",
"datePublished": "2025-03-17T13:06:07.828Z",
"dateReserved": "2019-10-16T00:00:00.000Z",
"dateUpdated": "2025-03-17T13:35:08.816Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-17659\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2025-03-17T14:15:16.360\",\"lastModified\":\"2025-07-15T16:48:48.100\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user \\\"tunneluser\\\" by leveraging knowledge of the private key from another installation or a firmware image.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el uso de una clave criptogr\u00e1fica codificada en FortiSIEM versi\u00f3n 5.2.6 puede permitir que un atacante remoto no autenticado obtenga acceso SSH al supervisor como el usuario restringido \\\"tunneluser\\\" aprovechando el conocimiento de la clave privada de otra instalaci\u00f3n o una imagen de firmware.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.2.7\",\"matchCriteriaId\":\"C961C610-69DC-495B-BEA0-203F0A2AD0C1\"}]}]}],\"references\":[{\"url\":\"https://fortiguard.fortinet.com/psirt/FG-IR-19-296\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-17659\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-17T13:35:01.135210Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-17T13:35:04.552Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:X/RC:X\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [], \"vendor\": \"Fortinet\", \"product\": \"FortiSIEM\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.2.6\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. \\r\\nWorkaround (for FortiSIEM version 5.2.6 and lower): \\r\\nCustomers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999 by following the steps below :\\r\\n1. SSH to the Supervisor node as the root user.\\r\\n2. Remove tunneluser SSH configuration file to disable listening on port 19999:\\r\\nrm -f /etc/ssh/sshd_config.tunneluser\\r\\necho rm -f /etc/ssh/sshd_config.tunneluser \u003e\u003e /etc/init.d/phProvision.sh\\r\\n3. Then terminate sshd running on TCP Port 19999 as follows:\\r\\npkill -f /usr/sbin/sshd -p 19999\\r\\n4.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account:\\r\\nrm -f /opt/phoenix/deployment/id_rsa.pub.tunneluser\\r\\nrm -f /home/tunneluser/.ssh/authorized_keys\\r\\nrm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsa\\r\\nCustomers are also advised to disable \\\"tunneluser\\\" SSH access on port 22 by following the steps bwlow:\\r\\n1. SSH to the Supervisor node as the root user.\\r\\n2. Add/edit the following line in sshd_config file: \\r\\necho DenyUsers tunneluser \u003e\u003e /etc/ssh/sshd_config\\r\\n3. service sshd restart\"}], \"references\": [{\"url\": \"https://fortiguard.fortinet.com/psirt/FG-IR-19-296\", \"name\": \"https://fortiguard.fortinet.com/psirt/FG-IR-19-296\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user \\\"tunneluser\\\" by leveraging knowledge of the private key from another installation or a firmware image.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-798\", \"description\": \"Improper access control\"}]}], \"providerMetadata\": {\"orgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"shortName\": \"fortinet\", \"dateUpdated\": \"2025-03-17T13:06:07.828Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2019-17659\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-17T13:35:08.816Z\", \"dateReserved\": \"2019-10-16T00:00:00.000Z\", \"assignerOrgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"datePublished\": \"2025-03-17T13:06:07.828Z\", \"assignerShortName\": \"fortinet\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…