A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-19-296 |
![]() ![]() |
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortisiem |
|
CPEs | cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet fortisiem |
Mon, 17 Mar 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 17 Mar 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image. | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-17T13:35:08.816Z
Reserved: 2019-10-16T00:00:00.000Z
Link: CVE-2019-17659

Updated: 2025-03-17T13:35:04.552Z

Status : Analyzed
Published: 2025-03-17T14:15:16.360
Modified: 2025-07-15T16:48:48.100
Link: CVE-2019-17659

No data.