CVE-2019-17659

📊 3.7 LOW0.1%🎯 0 exploits
📅 Published Mar 17, 2025
📋 Status: Analyzed

A use of hard-coded cryptographic key vulnerability in FortiSIEM version 5.2.6 may allow a remote unauthenticated attacker to obtain SSH access to the supervisor as the restricted user "tunneluser" by leveraging knowledge of the private key from another installation or a firmware image.

🎯 Affected Products & Systems

1 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: < 5.2.7
CPE:
cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
Metrics
3.7 LOWCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector:
NETWORK
Complexity:
HIGH
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
NONE
Integrity:
NONE
Availability:
LOW
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
3.7 (LOW)v3.1
EPSS Details
0.1% (Minimal)34.1th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Mar 17, 2025 (7 months ago)
Last Modified
Jul 15, 2025 (3 months ago)
Security Weaknesses1
References2