Lucene search

K
cvelistFortinetCVELIST:CVE-2023-45585
HistoryNov 14, 2023 - 6:05 p.m.

CVE-2023-45585

2023-11-1418:05:44
CWE-532
fortinet
www.cve.org
vulnerability
sensitive information
log files
fortisiem
elasticsearch
cwe-532
authenticated user
debug log files
version 7.0.0
version 6.7.6
version 6.6.3
version 6.5.1
version 6.4.2
version 6.3.3
version 6.2.1
version 6.1.2
version 5.4.0
version 5.3.3

2.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

4.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiSIEM",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.7.0",
        "lessThanOrEqual": "6.7.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.6.0",
        "lessThanOrEqual": "6.6.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.5.0",
        "lessThanOrEqual": "6.5.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.3.0",
        "lessThanOrEqual": "6.3.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.1.0",
        "lessThanOrEqual": "6.1.2",
        "status": "affected"
      },
      {
        "version": "5.4.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.3.0",
        "lessThanOrEqual": "5.3.3",
        "status": "affected"
      }
    ]
  }
]

2.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

4.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CVELIST:CVE-2023-45585