CVE-2019-6693
high-risk
Published 2019-11-21
Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).
Do I need to act?
!
72.2% chance of exploitation in next 30 days
EPSS score — higher than 28% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Vendors
References (3)
Mitigation
https://fortiguard.com/advisory/FG-IR-19-007
Mitigation
https://fortiguard.com/advisory/FG-IR-19-007
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-...
57
/ 100
high-risk
Severity
24/34 · High
Exploitability
26/34 · High
Exposure
7/34 · Low