CVE-2022-43949

A use of a broken or risky cryptographic algorithm [CWE-327] in Fortinet FortiSIEM before 6.7.1 allows a remote unauthenticated attacker to perform brute force attacks on GUI endpoints via taking advantage of outdated hashing methods.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-22-259 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:6.7.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-06-13 09:15

Updated : 2023-11-07 03:54


NVD link : CVE-2022-43949

Mitre link : CVE-2022-43949

CVE.ORG link : CVE-2022-43949


JSON object : View

Products Affected

fortinet

  • fortisiem
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm