Project Subscriptions
No advisories yet.
Solution
Upgrade to FortiSOAR on-premise version 7.6.5 or above Upgrade to upcoming FortiSOAR on-premise version 7.5.3 or above Upgrade to FortiSOAR PaaS version 7.6.5 or above Upgrade to upcoming FortiSOAR PaaS version 7.5.3 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-26-105 |
|
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A storing passwords in a recoverable format vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.4, FortiSOAR PaaS 7.5.0 through 7.5.2, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.4, FortiSOAR on-premise 7.5.0 through 7.5.2, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an authenticated remote attacker to retrieve Service account password via server address modification in LDAP configuration. | |
| First Time appeared |
Fortinet
Fortinet fortisoaron-premise Fortinet fortisoarpaas |
|
| Weaknesses | CWE-257 | |
| CPEs | cpe:2.3:a:fortinet:fortisoaron-premise:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.5.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.6.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.6.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.6.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.6.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoaron-premise:7.6.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.3.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.5.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.6.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.6.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.6.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.6.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoarpaas:7.6.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortisoaron-premise Fortinet fortisoarpaas |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-04-14T16:46:16.794Z
Reserved: 2026-01-07T18:30:44.883Z
Link: CVE-2026-22574
Updated: 2026-04-14T16:37:28.761Z
Status : Received
Published: 2026-04-14T16:16:36.760
Modified: 2026-04-14T16:16:36.760
Link: CVE-2026-22574
No data.
OpenCVE Enrichment
No data.