Encrypted password stored in logs
Summary
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiSIEM may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.
Version | Affected | Solution |
---|---|---|
FortiSIEM 7.1 | Not affected | Not Applicable |
FortiSIEM 7.0 | 7.0.0 | Upgrade to 7.0.1 or above |
FortiSIEM 6.7 | 6.7.0 through 6.7.6 | Upgrade to 6.7.7 or above |
FortiSIEM 6.6 | 6.6.0 through 6.6.3 | Upgrade to 6.6.4 or above |
FortiSIEM 6.5 | 6.5.0 through 6.5.1 | Upgrade to 6.5.2 or above |
FortiSIEM 6.4 | 6.4.0 through 6.4.2 | Upgrade to 6.4.3 or above |
FortiSIEM 6.3 | 6.3 all versions | Migrate to a fixed release |
FortiSIEM 6.2 | 6.2 all versions | Migrate to a fixed release |
FortiSIEM 6.1 | 6.1 all versions | Migrate to a fixed release |
FortiSIEM 5.4 | 5.4 all versions | Migrate to a fixed release |
FortiSIEM 5.3 | 5.3 all versions | Migrate to a fixed release |
Acknowledgement
Internally discovered and reported by Jingjin ZhuTimeline
2023-11-07: Initial publication