A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-259 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-22-259 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.2 |
References | () https://fortiguard.com/psirt/FG-IR-22-259 - Vendor Advisory |
17 Jun 2023, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://fortiguard.com/psirt/FG-IR-22-259 - Vendor Advisory | |
CWE | CWE-327 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Fortinet fortisiem
Fortinet |
|
CPE | cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.7.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:* |
13 Jun 2023, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-13 09:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-43949
Mitre link : CVE-2022-43949
CVE.ORG link : CVE-2022-43949
JSON object : View
Products Affected
fortinet
- fortisiem
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm