Lucene search

K
cve[email protected]CVE-2023-45585
HistoryNov 14, 2023 - 6:15 p.m.

CVE-2023-45585

2023-11-1418:15:55
CWE-532
web.nvd.nist.gov
22
cve-2023-45585
information security
vulnerability
log file
cwe-532
fortisiem
elasticsearch
nvd

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.

Affected configurations

NVD
Node
fortinetfortisiemRange5.3.05.3.3
OR
fortinetfortisiemRange6.7.06.7.6
OR
fortinetfortisiemMatch5.4.0
OR
fortinetfortisiemMatch6.1.0
OR
fortinetfortisiemMatch6.1.1
OR
fortinetfortisiemMatch6.1.2
OR
fortinetfortisiemMatch6.2.0
OR
fortinetfortisiemMatch6.2.1
OR
fortinetfortisiemMatch6.3.0
OR
fortinetfortisiemMatch6.3.1
OR
fortinetfortisiemMatch6.3.2
OR
fortinetfortisiemMatch6.3.3
OR
fortinetfortisiemMatch6.4.0
OR
fortinetfortisiemMatch6.4.1
OR
fortinetfortisiemMatch6.4.2
OR
fortinetfortisiemMatch6.5.0
OR
fortinetfortisiemMatch6.5.1
OR
fortinetfortisiemMatch6.6.0
OR
fortinetfortisiemMatch6.6.1
OR
fortinetfortisiemMatch6.6.2
OR
fortinetfortisiemMatch6.6.3
OR
fortinetfortisiemMatch7.0.0

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiSIEM",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.7.0",
        "lessThanOrEqual": "6.7.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.6.0",
        "lessThanOrEqual": "6.6.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.5.0",
        "lessThanOrEqual": "6.5.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.3.0",
        "lessThanOrEqual": "6.3.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.1.0",
        "lessThanOrEqual": "6.1.2",
        "status": "affected"
      },
      {
        "version": "5.4.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.3.0",
        "lessThanOrEqual": "5.3.3",
        "status": "affected"
      }
    ]
  }
]

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Related for CVE-2023-45585