FortiTray stores the SSLVPN password in cleartext
Summary
An exposure of sensitive information to an unauthorized actor vulnerabiltiy [CWE-200] in FortiClient for Mac may allow a local authenticated attacker to obtain the SSL-VPN password in cleartext via running a logstream for the FortiTray process in the terminal.
| Version | Affected | Solution |
|---|---|---|
| FortiClientMac 7.0 | 7.0.0 through 7.0.5 | Upgrade to 7.0.6 or above |
Acknowledgement
Fortinet is pleased to thank Pavel Bondarenko for reporting this vulnerability under responsible disclosure.Timeline
2022-11-01: Initial publication
References
- Disable "Save Password" setting either on FortiGate SSLVPN settings or in FortiClientMAC