6.5
CVSSv3

CVE-2019-6693

Published: 21/11/2019 Updated: 27/11/2019
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 357
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fortinet fortios

fortinet fortios 6.2.0

Github Repositories

Decrypt FortiGate configuration secrets

CVE-2019-6693 Decrypt FortiGate configuration secrets Original advisory Vendor advisory For Fortigate VM/appliances below versions 620, 600 to 606, 5610 configuration secrets are stored encrypted with a unique key For versions above the non-default private-data-encryption parameter lets the user use a custom key This is rarely used, even today This script decrypts se

Decrypt reversible secrets encrypted using the default hardcoded key related to CVE-2020-9289 on FortiAnalyzer/FortiManager (the only difference with CVE-2019-6693 is the encryption routine).

Decrypt FortiManager configuration secrets (CVE-2020-9289) CVE-2020-9289 and CVE-2019-6693 are related to the same default and hardcoded key The only differences on the decryption routine implemented in FortiManager/FortiAnalyzer are: The IV handling (all the 16 bytes are provided before the encrypted data from digits) The last encrypted block is stripped from the output so

An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files and all non-administator passwords, private keys and High Availability passwords.

FortiGate Password Decrypt Script - CVE-2019-6693 🔐 An authorized remote user with access or knowledge of the standard encryption key could gain access and decrypt the FortiOS backup files and all non-administrator passwords, private keys, and High Availability (HA) passwords Overview This Python script is designed to recover passwords encrypted using FortiGate's en