A use of one-way hash with a predictable salt vulnerability in the password storing mechanism of FortiPortal 6.0.0 through 6.04 may allow an attacker already in possession of the password store to decrypt the passwords by means of precomputed tables.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-094 | Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-21-094 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/advisory/FG-IR-21-094 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 6.0 |
Information
Published : 2021-08-04 16:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32596
Mitre link : CVE-2021-32596
CVE.ORG link : CVE-2021-32596
JSON object : View
Products Affected
fortinet
- fortiportal
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort