Description
A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
Published: 2025-03-17
Score: 3.6 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Please upgrade to FortiSIEM version 5.2.7 and above where this issue is resolved. Workaround (for FortiSIEM version 5.2.6 and lower): Customers who are not using the reverse tunnel feature are advised to disable SSH service on port 19999 by following the steps below : 1. SSH to the Supervisor node as the root user. 2. Remove tunneluser SSH configuration file to disable listening on port 19999: rm -f /etc/ssh/sshd_config.tunneluser echo rm -f /etc/ssh/sshd_config.tunneluser >> /etc/init.d/phProvision.sh 3. Then terminate sshd running on TCP Port 19999 as follows: pkill -f /usr/sbin/sshd -p 19999 4.Additional steps can be performed on Supervisor to remove the keys associated with tunneluser account: rm -f /opt/phoenix/deployment/id_rsa.pub.tunneluser rm -f /home/tunneluser/.ssh/authorized_keys rm -f /opt/phoenix/id_rsa.tunneluser ~admin/.ssh/id_rsa Customers are also advised to disable "tunneluser" SSH access on port 22 by following the steps bwlow: 1. SSH to the Supervisor node as the root user. 2. Add/edit the following line in sshd_config file: echo DenyUsers tunneluser >> /etc/ssh/sshd_config 3. service sshd restart

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6589 A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00099}

epss

{'score': 0.00119}


Tue, 15 Jul 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortisiem
CPEs cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortisiem

Mon, 17 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 17 Mar 2025 13:30:00 +0000

Type Values Removed Values Added
Description A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 3.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:F/RL:X/RC:X'}


Subscriptions

Fortinet Fortisiem
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-17T13:35:08.816Z

Reserved: 2019-10-16T00:00:00.000Z

Link: CVE-2019-17659

cve-icon Vulnrichment

Updated: 2025-03-17T13:35:04.552Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-17T14:15:16.360

Modified: 2025-07-15T16:48:48.100

Link: CVE-2019-17659

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:32:00Z

Weaknesses