Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6693 PoC — Fortinet FortiOS 信任管理问题漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 信任管理问题漏洞 (CVE-2019-6693)
Description:Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).
Description
Decrypt FortiGate configuration secrets
Readme
# CVE-2019-6693
Decrypt FortiGate configuration secrets

[Original advisory](https://medium.com/@bart.dopheide/decrypting-fortigate-passwords-cve-2019-6693-1239f6fd5a61)
[Vendor advisory](https://www.fortiguard.com/psirt/FG-IR-19-007)

For Fortigate VM/appliances below versions 6.2.0, 6.0.0 to 6.0.6, 5.6.10 configuration secrets are stored encrypted with a unique key.
For versions above the non-default ```private-data-encryption``` parameter lets the user use a custom key. This is rarely used, even today.

This [script](./fortigate_decrypt.py) decrypts secrets from dumped configurations.
File Snapshot

[4.0K] /data/pocs/428480c938118932bb1b0757955325cb8f84d264 ├── [ 316] fortigate_decrypt.py └── [ 595] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →