Vulnerability Details CVE-2024-40585
An insertion of sensitive information into log file vulnerabilities [CWE-532] in FortiManager version 7.4.0, version 7.2.3 and below, version 7.0.8 and below, version 6.4.12 and below, version 6.2.11 and below and FortiAnalyzer version 7.4.0, version 7.2.3 and below, version 7.0.8 and below, version 6.4.12 and below, version 6.2.11 and below eventlog may allow any low privileged user with access to event log section to retrieve certificate private key and encrypted password logged as system log.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 7.0%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2024-40585
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.10
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.11
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.8
-
cpe:2.3:a:fortinet:fortianalyzer:6.2.9
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.0
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.1
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.10
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.11
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.12
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.2
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.3
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.4
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.5
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.6
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.7
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.8
-
cpe:2.3:a:fortinet:fortianalyzer:6.4.9
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.0
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.1
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.2
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.3
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.4
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.5
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.6
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.7
-
cpe:2.3:a:fortinet:fortianalyzer:7.0.8
-
cpe:2.3:a:fortinet:fortianalyzer:7.2.0
-
cpe:2.3:a:fortinet:fortianalyzer:7.2.1
-
cpe:2.3:a:fortinet:fortianalyzer:7.2.2
-
cpe:2.3:a:fortinet:fortianalyzer:7.2.3
-
cpe:2.3:a:fortinet:fortianalyzer:7.4.0
-
cpe:2.3:a:fortinet:fortimanager:6.2.0
-
cpe:2.3:a:fortinet:fortimanager:6.2.1
-
cpe:2.3:a:fortinet:fortimanager:6.2.10
-
cpe:2.3:a:fortinet:fortimanager:6.2.11
-
cpe:2.3:a:fortinet:fortimanager:6.2.12
-
cpe:2.3:a:fortinet:fortimanager:6.2.13
-
cpe:2.3:a:fortinet:fortimanager:6.2.2
-
cpe:2.3:a:fortinet:fortimanager:6.2.3
-
cpe:2.3:a:fortinet:fortimanager:6.2.4
-
cpe:2.3:a:fortinet:fortimanager:6.2.5
-
cpe:2.3:a:fortinet:fortimanager:6.2.6
-
cpe:2.3:a:fortinet:fortimanager:6.2.7
-
cpe:2.3:a:fortinet:fortimanager:6.2.8
-
cpe:2.3:a:fortinet:fortimanager:6.2.9
-
cpe:2.3:a:fortinet:fortimanager:6.4.0
-
cpe:2.3:a:fortinet:fortimanager:6.4.1
-
cpe:2.3:a:fortinet:fortimanager:6.4.10
-
cpe:2.3:a:fortinet:fortimanager:6.4.11
-
cpe:2.3:a:fortinet:fortimanager:6.4.12
-
cpe:2.3:a:fortinet:fortimanager:6.4.13
-
cpe:2.3:a:fortinet:fortimanager:6.4.15
-
cpe:2.3:a:fortinet:fortimanager:6.4.2
-
cpe:2.3:a:fortinet:fortimanager:6.4.3
-
cpe:2.3:a:fortinet:fortimanager:6.4.4
-
cpe:2.3:a:fortinet:fortimanager:6.4.5
-
cpe:2.3:a:fortinet:fortimanager:6.4.6
-
cpe:2.3:a:fortinet:fortimanager:6.4.7
-
cpe:2.3:a:fortinet:fortimanager:6.4.8
-
cpe:2.3:a:fortinet:fortimanager:6.4.9
-
cpe:2.3:a:fortinet:fortimanager:7.0.0
-
cpe:2.3:a:fortinet:fortimanager:7.0.1
-
cpe:2.3:a:fortinet:fortimanager:7.0.2
-
cpe:2.3:a:fortinet:fortimanager:7.0.3
-
cpe:2.3:a:fortinet:fortimanager:7.0.4
-
cpe:2.3:a:fortinet:fortimanager:7.0.5
-
cpe:2.3:a:fortinet:fortimanager:7.0.6
-
cpe:2.3:a:fortinet:fortimanager:7.0.7
-
cpe:2.3:a:fortinet:fortimanager:7.0.8
-
cpe:2.3:a:fortinet:fortimanager:7.2.0
-
cpe:2.3:a:fortinet:fortimanager:7.2.1
-
cpe:2.3:a:fortinet:fortimanager:7.2.2
-
cpe:2.3:a:fortinet:fortimanager:7.2.3
-
cpe:2.3:a:fortinet:fortimanager:7.4.0