
Cloud Vulnerability DB
A community-led vulnerabilities database
A use of hard-coded cryptographic key vulnerability (CVE-2022-23441) was identified in FortiEDR versions 5.0.2, 5.0.1, 5.0.0, and 4.0.0. The vulnerability was disclosed on April 6, 2022, and is classified under CWE-321 (Use of Hard-coded Cryptographic Key). This security flaw affects FortiEDR Collector versions prior to 5.0.3 b0508 and FortiEDR versions prior to 5.0.3 (NVD, CERT-FR).
The vulnerability stems from the use of hard-coded cryptographic keys in the affected FortiEDR versions. This implementation flaw is categorized as CWE-321, which is a known weakness pattern where cryptographic keys are embedded directly into the software rather than being securely managed. The vulnerability allows potential network-based attacks through the misuse of these hard-coded keys (MITRE CVE).
The vulnerability enables an unauthenticated attacker on the network to impersonate and forge messages from other collectors. This could potentially lead to unauthorized access, data manipulation, and compromise of the security infrastructure (NVD).
Fortinet has addressed this vulnerability by releasing updated versions of the affected software. Organizations are advised to upgrade to FortiEDR version 5.0.3 or later, and FortiEDR Collector version 5.0.3 b0508 or later (CERT-FR).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."