Lucene search

K
cvelistFortinetCVELIST:CVE-2023-45585
HistoryNov 14, 2023 - 6:05 p.m.

CVE-2023-45585

2023-11-1418:05:44
CWE-532
fortinet
www.cve.org
5
vulnerability
sensitive information
log files
fortisiem
elasticsearch
cwe-532
authenticated user
debug log files
version 7.0.0
version 6.7.6
version 6.6.3
version 6.5.1
version 6.4.2
version 6.3.3
version 6.2.1
version 6.1.2
version 5.4.0
version 5.3.3

CVSS3

2.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

AI Score

4.2

Confidence

High

EPSS

0

Percentile

9.0%

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiSIEM",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.7.0",
        "lessThanOrEqual": "6.7.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.6.0",
        "lessThanOrEqual": "6.6.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.5.0",
        "lessThanOrEqual": "6.5.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.3.0",
        "lessThanOrEqual": "6.3.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.1.0",
        "lessThanOrEqual": "6.1.2",
        "status": "affected"
      },
      {
        "version": "5.4.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.3.0",
        "lessThanOrEqual": "5.3.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

2.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

AI Score

4.2

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVELIST:CVE-2023-45585