Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.2493 FortiNAC - Weak password hashing method in /etc/shadow 4 May 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: FortiNAC Publisher: Fortinet Operating System: Network Appliance Resolution: Patch/Upgrade CVE Names: CVE-2022-45859 Original Bulletin: https://fortiguard.fortinet.com/psirt/FG-IR-22-456 Comment: CVSS (Max): 3.9 CVE-2022-45859 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:X/RC:R) CVSS Source: Fortinet Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:F/RL:X/RC:R - --------------------------BEGIN INCLUDED TEXT-------------------- FortiNAC - Weak password hashing method in /etc/shadow IR Number : FG-IR-22-456 Date : May 3, 2023 Severity : Low CVSSv3 Score : 3.9 Impact : Improper access control CVE ID : CVE-2022-45859 Affected Products: FortiNAC: 9.4.1, 9.4.0, 9.2.6, 9.2.5, 9.2.4, 9.2.3, 9.2.2, 9.2.1, 9.2.0, 9.1.8, 9.1.7, 9.1.6, 9.1.5, 9.1.4, 9.1.3, 9.1.2, 9.1.1, 9.1.0, 8.8.9, 8.8.8, 8.8.7, 8.8.6, 8.8.5, 8.8.4, 8.8.3, 8.8.2, 8.8.11, 8.8.10, 8.8.1, 8.8.0, 8.7.6, 8.7.5, 8.7.4, 8.7.3, 8.7.2, 8.7.1, 8.7.0 Summary An insufficiently protected credentials vulnerability [CWE-522] in FortiNAC may allow a local attacker with system access to retrieve users' passwords. Affected Products At least FortiNAC-F version 7.2.0 FortiNAC version 9.4.0 through 9.4.1 FortiNAC version 9.2.0 through 9.2.6 FortiNAC 9.1 all versions FortiNAC 8.8 all versions FortiNAC 8.7 all versions Solutions Please upgrade to FortiNAC-F version 7.2.1 or above Please upgrade to FortiNAC version 9.4.2 or above Please upgrade to FortiNAC version 9.2.7 or above After the upgrade, the CLI account password should be changed. To know which accounts require a new password, the following command can be run: grep ":\$1" /etc/shadow Then, login to the CLI with that user and type "passwd" to change the password and update the hash. Acknowledgement Fortinet is pleased to thank KPN for bringing this issue to our attention under responsible disclosure. Timeline 2023-04-13: Initial publication - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZFMa/skNZI30y1K9AQhOohAAurD/2R9teP241eWr4+CvcSYUBinwbLHg tgD1FpfWVspZDSgmCBmJ2RXo08ApqVDkHTaoLH54qtvPTKxVFG53JF6a+uGcsMM9 +nsT+OajLTXIQLc92kgtO2n4pK1g8NAOl7JPK+OX6D2f/xPwxhrFdLMHO78baDLF 7Yn30vgwxnJTyIquP54kcX4e/wYbjQEmIy6rRMYrc2V1T8Bb3kAFIkY808CBjnSn mscaLR56a692rDB8IohP1ulecfrYtWa44p1ZcOY0mfW4Z7dpt4URwao1uUPHDE1K gEVa/3Ua9xT83+xdoloL/wymnPXuBCD/eWs2P7qVZ6bo3cB/kvjE/b3E3H60IPqC JX9WiPQCBq0TbsjomYlJ7uMAoH/ANNczUbm8BRgccJPbSUksdqhFJoxowyH53eHN TxDt983CVAsOaUGyNda/OysrRn75vxQ9wHVps149fgc35gqR4f1FH/uslz9Prt4F xmahJb3M74oJasTsM2XZ8q6JuLoRNS/Yz4Ig9Y6JJaqryOkZhKwqL+r/6/XpVpjJ Itc1WHXvOWF8AGO+Iahcxkp9B1+STZ6zsT5VYfMBSOMBO8lohGKuL6DUdwSzGjGL yG9ZIAOPwkv3CCmj5yESHcL4swxmA4agfBDQJDTufrRqRTaXLS1843P7SNHNBMnj 8ODYgbHM7QM= =8qbv -----END PGP SIGNATURE-----