A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-19-296 |
![]() ![]() |
History
Mon, 17 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 17 Mar 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image. | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published: 2025-03-17T13:06:07.828Z
Updated: 2025-03-17T13:35:08.816Z
Reserved: 2019-10-16T00:00:00.000Z
Link: CVE-2019-17659

Updated: 2025-03-17T13:35:04.552Z

Status : Received
Published: 2025-03-17T14:15:16.360
Modified: 2025-03-17T14:15:16.360
Link: CVE-2019-17659

No data.