CVE-2015-1453

The qm class in Fortinet FortiClient 5.2.3.091 for Android uses a hardcoded encryption key of FoRtInEt!AnDrOiD, which makes it easier for attackers to obtain passwords and possibly other sensitive data by leveraging the key to decrypt data in the Shared Preferences.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:android:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2015/Jan/124 - Exploit () http://seclists.org/fulldisclosure/2015/Jan/124 - Exploit
References () http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf - Exploit () http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiClient_Multiple_Vulnerabilities.pdf - Exploit
References () http://www.securityfocus.com/bid/72383 - () http://www.securityfocus.com/bid/72383 -

Information

Published : 2015-02-02 16:59

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1453

Mitre link : CVE-2015-1453

CVE.ORG link : CVE-2015-1453


JSON object : View

Products Affected

fortinet

  • forticlient
CWE
CWE-310

Cryptographic Issues