CVE-2022-45858

A use of a weak cryptographic algorithm vulnerability [CWE-327] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.0 all versions, 8.8.0 all versions, 8.7.0 all versions may increase the chances of an attacker to have access to sensitive information or to perform man-in-the-middle attacks.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-22-452 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*

History

11 May 2023, 17:50

Type Values Removed Values Added
References (MISC) https://fortiguard.com/psirt/FG-IR-22-452 - (MISC) https://fortiguard.com/psirt/FG-IR-22-452 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4
CPE cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
CWE CWE-327
First Time Fortinet fortinac
Fortinet

03 May 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-03 22:15

Updated : 2023-12-10 15:01


NVD link : CVE-2022-45858

Mitre link : CVE-2022-45858

CVE.ORG link : CVE-2022-45858


JSON object : View

Products Affected

fortinet

  • fortinac
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm