Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions prior to 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fortinet fortiauthenticator |