6 results (0.006 seconds)

CVSS: 3.3EPSS: 0%CPEs: 22EXPL: 0

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM version 7.0.0, version 6.7.6 and below, version 6.6.3 and below, version 6.5.1 and below, version 6.4.2 and below, version 6.3.3 and below, version 6.2.1 and below, version 6.1.2 and below, version 5.4.0, version 5.3.3 and below may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage. Una inserción de información confidencial en la vulnerabilidad del archivo de registro [CWE-532] en FortiSIEM versión 7.0.0, versión 6.7.6 e inferior, versión 6.6.3 e inferior, versión 6.5.1 e inferior, versión 6.4.2 e inferior, versión 6.3.3 y anteriores, versión 6.2.1 y siguientes, versión 6.1.2 y siguientes, versión 5.4.0, versión 5.3.3 y siguientes pueden permitir que un usuario autenticado vea una contraseña cifrada de ElasticSearch a través de archivos de registro de depuración generados cuando FortiSIEM está configurado con ElasticSearch Event Storage. • https://fortiguard.com/psirt/FG-IR-23-392 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 9.8EPSS: 0%CPEs: 17EXPL: 0

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 and 5.0.0 through 5.0.1 and 4.10.0 and 4.9.0 and 4.7.2 allows attacker to execute unauthorized code or commands via crafted API requests. Una neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiSIEM versión 5.4.0 y 5.3.0 a 5.3.3 y 5.2.5 a 5.2.8 y 5.2.1 a 5.2.2 y 5.1.0 a 5.1.3 y 5.0.0 a 5.0.1 y 4.10.0 y 4.9.0 y 4.7.2 permiten a un atacante ejecutar código o comandos no autorizados a través de solicitudes API manipuladas. • https://fortiguard.com/psirt/FG-IR-23-135 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 15EXPL: 0

A plaintext storage of a password vulnerability [CWE-256] in FortiSIEM 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions may allow an attacker able to access user DB content to impersonate any admin user on the device GUI. • https://fortiguard.com/psirt/FG-IR-21-141 • CWE-256: Plaintext Storage of a Password CWE-522: Insufficiently Protected Credentials •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods. • https://fortiguard.com/psirt/FG-IR-22-259 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 8.8EPSS: 0%CPEs: 25EXPL: 0

An Improper Restriction of Excessive Authentication Attempts [CWE-307] in FortiSIEM below 7.0.0 may allow a non-privileged user with access to several endpoints to brute force attack these endpoints. • https://fortiguard.com/psirt/FG-IR-22-258 • CWE-307: Improper Restriction of Excessive Authentication Attempts •