Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-10925 | Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key. |
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-20-049 |
|
Tue, 24 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-25T13:57:36.414Z
Reserved: 2021-01-13T00:00:00.000Z
Link: CVE-2021-24005
Updated: 2024-08-03T19:14:10.117Z
Status : Modified
Published: 2021-07-06T11:15:08.560
Modified: 2024-11-21T05:52:11.520
Link: CVE-2021-24005
No data.
OpenCVE Enrichment
No data.
EUVD