CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortisiem | * | cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:* |
fortinet | fortisiem | 5.0.0 | cpe:2.3:a:fortinet:fortisiem:5.0.0:*:*:*:*:*:*:* |
fortinet | fortisiem | 5.0.1 | cpe:2.3:a:fortinet:fortisiem:5.0.1:*:*:*:*:*:*:* |
fortinet | fortisiem | 5.2.1 | cpe:2.3:a:fortinet:fortisiem:5.2.1:*:*:*:*:*:*:* |
fortinet | fortisiem | 5.2.2 | cpe:2.3:a:fortinet:fortisiem:5.2.2:*:*:*:*:*:*:* |
fortinet | fortisiem | 5.4.0 | cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:* |
fortinet | fortisiem | 6.2.0 | cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:* |
fortinet | fortisiem | 6.2.1 | cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:* |
fortinet | fortisiem | 6.4.0 | cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:* |
fortinet | fortisiem | 6.4.1 | cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:* |
[
{
"vendor": "Fortinet",
"product": "Fortinet FortiSIEM",
"versions": [
{
"version": "FortiSIEM 6.4.0, 6.3.3, 6.3.2, 6.3.1, 6.3.0, 6.2.1, 6.2.0, 6.1.2, 6.1.1, 6.1.0, 5.4.0, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.2, 5.2.1, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.1, 5.0.0",
"status": "affected"
}
]
}
]
More