Lucene search

K
cveFortinetCVE-2023-40715
HistorySep 13, 2023 - 1:15 p.m.

CVE-2023-40715

2023-09-1313:15:09
CWE-312
fortinet
web.nvd.nist.gov
15
cve-2023-40715
cleartext storage
sensitive information
vulnerability
cwe-312
fortitester
nvd
security
access
plaintext password
external servers

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0

Percentile

9.0%

A cleartext storage of sensitive information vulnerability [CWE-312] inย FortiTesterย 2.3.0 through 7.2.3 may allowย an attacker with access to the DB contents to retrieve the plaintext password of external servers configured in the device.

Affected configurations

Nvd
Node
fortinetfortitesterRange2.3.0โ€“7.2.3
VendorProductVersionCPE
fortinetfortitester*cpe:2.3:a:fortinet:fortitester:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiTester",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.1.0",
        "lessThanOrEqual": "7.1.1",
        "status": "affected"
      },
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "4.2.0",
        "lessThanOrEqual": "4.2.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "4.1.0",
        "lessThanOrEqual": "4.1.1",
        "status": "affected"
      },
      {
        "version": "4.0.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.9.0",
        "lessThanOrEqual": "3.9.2",
        "status": "affected"
      },
      {
        "version": "3.8.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.7.0",
        "lessThanOrEqual": "3.7.1",
        "status": "affected"
      },
      {
        "version": "3.6.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.5.0",
        "lessThanOrEqual": "3.5.1",
        "status": "affected"
      },
      {
        "version": "3.4.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.3.0",
        "lessThanOrEqual": "3.3.1",
        "status": "affected"
      },
      {
        "version": "3.2.0",
        "status": "affected"
      },
      {
        "version": "3.1.0",
        "status": "affected"
      },
      {
        "version": "3.0.0",
        "status": "affected"
      },
      {
        "version": "2.9.0",
        "status": "affected"
      },
      {
        "version": "2.8.0",
        "status": "affected"
      },
      {
        "version": "2.7.0",
        "status": "affected"
      },
      {
        "version": "2.6.0",
        "status": "affected"
      },
      {
        "version": "2.5.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "2.4.0",
        "lessThanOrEqual": "2.4.1",
        "status": "affected"
      },
      {
        "version": "2.3.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVE-2023-40715