Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. Workaround (for FortiSIEM version 5.2.6 and lower): Customers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999 by following the steps below : 1. SSH to the Supervisor node as the root user. 2. Remove tunneluser SSH configuration file to disable listening on port 19999: rm -f /etc/ssh/sshd_config.tunneluser echo rm -f /etc/ssh/sshd_config.tunneluser >> /etc/init.d/phProvision.sh 3. Then terminate sshd running on TCP Port 19999 as follows: pkill -f /usr/sbin/sshd -p 19999 4.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account: rm -f /opt/phoenix/deployment/id_rsa.pub.tunneluser rm -f /home/tunneluser/.ssh/authorized_keys rm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsa Customers are also advised to disable "tunneluser" SSH access on port 22 by following the steps bwlow: 1. SSH to the Supervisor node as the root user. 2. Add/edit the following line in sshd_config file: echo DenyUsers tunneluser >> /etc/ssh/sshd_config 3. service sshd restart
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6589 | A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image. |
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-19-296 |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortisiem |
|
| CPEs | cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortinet
Fortinet fortisiem |
Mon, 17 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 17 Mar 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image. | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-17T13:35:08.816Z
Reserved: 2019-10-16T00:00:00.000Z
Link: CVE-2019-17659
Updated: 2025-03-17T13:35:04.552Z
Status : Analyzed
Published: 2025-03-17T14:15:16.360
Modified: 2025-07-15T16:48:48.100
Link: CVE-2019-17659
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:32:00Z
EUVD