CVE-2022-45858

A use of a weak cryptographic algorithm vulnerability [CWE-327] in FortiNAC 9.4.1 and below, 9.2.6 and below, 9.1.0 all versions, 8.8.0 all versions, 8.7.0 all versions may increase the chances of an attacker to have access to sensitive information or to perform man-in-the-middle attacks.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.4
v2 : unknown
v3 : 4.2
References () https://fortiguard.com/psirt/FG-IR-22-452 - Vendor Advisory () https://fortiguard.com/psirt/FG-IR-22-452 - Vendor Advisory

11 May 2023, 17:50

Type Values Removed Values Added
CWE CWE-327
CPE cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:*
References (MISC) https://fortiguard.com/psirt/FG-IR-22-452 - (MISC) https://fortiguard.com/psirt/FG-IR-22-452 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4
First Time Fortinet
Fortinet fortinac

03 May 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-03 22:15

Updated : 2024-11-21 07:29


NVD link : CVE-2022-45858

Mitre link : CVE-2022-45858

CVE.ORG link : CVE-2022-45858


JSON object : View

Products Affected

fortinet

  • fortinac
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm