INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h Global vulnerability Information Technology / Cybersecurity CRITICAL 2h Global malware Energy and Utilities CRITICAL 2h Global ransomware Multiple sectors CRITICAL 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 5h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 5h Global phishing Multiple sectors HIGH 6h Global insider Cybersecurity Services CRITICAL 6h Global ransomware Multiple sectors (U.S. companies) CRITICAL 6h Global malware Financial Services, Cryptocurrency CRITICAL 7h Global malware Technology and Cloud Services HIGH 7h
Vulnerabilities

CVE-2019-6693

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability — Fortinet FortiOS contains a use of hard-coded credentials vulnerability that could allow an attacker to cipher sensitive data in FortiOS
Published: Jun 25, 2025  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability — Fortinet FortiOS contains a use of hard-coded credentials vulnerability that could allow an attacker to cipher sensitive data in FortiOS configuration backup file via knowledge of the hard-coded key.

🤖 AI Executive Summary

CVE-2019-6693 is a critical vulnerability in Fortinet FortiOS involving hard-coded cryptographic credentials used to encrypt configuration backup files. An attacker with knowledge of the hard-coded key can decrypt sensitive configuration data, potentially exposing credentials, network topology, VPN configurations, and firewall rules. With a CVSS score of 9.0 and a known public exploit, this vulnerability poses an immediate and severe risk to any organization relying on FortiOS for network security. Organizations that have exported or stored FortiOS configuration backups should treat those files as fully compromised.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 16, 2026 03:49
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability has severe implications for Saudi organizations across multiple critical sectors. Banking and financial institutions regulated by SAMA that use FortiGate firewalls for perimeter security risk exposure of their entire network segmentation strategy and internal credentials. Government entities under NCA oversight using FortiOS for classified or sensitive network protection face potential full network compromise if backup files are accessed. Saudi Aramco and energy sector organizations relying on FortiOS to protect OT/IT boundaries could see their network architecture fully exposed, enabling targeted attacks on industrial systems. Telecom providers such as STC using FortiOS for core network protection risk exposure of peering configurations and customer-facing infrastructure. Given the widespread deployment of Fortinet products across Saudi Arabia's Vision 2030 digital infrastructure projects, the blast radius of this vulnerability is exceptionally high. Any third-party vendor or managed security service provider (MSSP) storing FortiOS backup files on behalf of Saudi clients amplifies the risk significantly.
🏢 Affected Saudi Sectors
Banking Government Energy Telecom Healthcare Defense Critical Infrastructure Managed Security Services
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all FortiOS devices in your environment and check firmware versions — versions prior to 6.2.0 are vulnerable.
2. Audit and inventory all FortiOS configuration backup files stored on file servers, SFTP servers, backup systems, or email archives.
3. Treat all existing backup files as compromised — rotate all credentials, VPN pre-shared keys, and certificates referenced in those configurations immediately.
4. Restrict access to backup files to authorized personnel only and encrypt them with organization-controlled keys.

PATCHING GUIDANCE:
5. Upgrade FortiOS to version 6.2.0 or later, which addresses the hard-coded credential issue.
6. Follow Fortinet's official upgrade path documentation to avoid service disruption.
7. After patching, generate new configuration backups and securely delete old ones.

COMPENSATING CONTROLS (if patching is delayed):
8. Immediately restrict who can initiate or download configuration backups.
9. Store backup files only in encrypted, access-controlled repositories with full audit logging.
10. Monitor for unauthorized access to backup files using DLP and SIEM alerting.
11. Rotate all credentials and keys that may appear in FortiOS configurations as a precaution.

DETECTION RULES:
12. Create SIEM alerts for any access to FortiOS backup file directories or FTP/SFTP transfers of .conf files.
13. Monitor for use of known FortiOS hard-coded key in network traffic or file system activity.
14. Review FortiGate logs for unauthorized admin logins that may indicate credential reuse from decrypted backups.
15. Deploy threat intelligence feeds to detect exploitation attempts targeting FortiOS devices.
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة FortiOS في بيئتك والتحقق من إصدارات البرامج الثابتة — الإصدارات السابقة لـ 6.2.0 معرضة للخطر.
2. مراجعة وجرد جميع ملفات النسخ الاحتياطي لإعدادات FortiOS المخزنة على خوادم الملفات أو خوادم SFTP أو أنظمة النسخ الاحتياطي أو أرشيفات البريد الإلكتروني.
3. اعتبار جميع ملفات النسخ الاحتياطي الموجودة مخترقة — قم بتدوير جميع بيانات الاعتماد ومفاتيح VPN المشتركة مسبقاً والشهادات المشار إليها في تلك الإعدادات فوراً.
4. تقييد الوصول إلى ملفات النسخ الاحتياطي للموظفين المصرح لهم فقط وتشفيرها بمفاتيح تتحكم فيها المؤسسة.

إرشادات التصحيح:
5. ترقية FortiOS إلى الإصدار 6.2.0 أو أحدث الذي يعالج مشكلة بيانات الاعتماد المضمنة.
6. اتباع وثائق مسار الترقية الرسمية من Fortinet لتجنب انقطاع الخدمة.
7. بعد التصحيح، إنشاء نسخ احتياطية جديدة للإعدادات وحذف القديمة بشكل آمن.

ضوابط التعويض (إذا تأخر التصحيح):
8. تقييد فوري لمن يمكنه بدء أو تنزيل النسخ الاحتياطية للإعدادات.
9. تخزين ملفات النسخ الاحتياطي فقط في مستودعات مشفرة وخاضعة للتحكم في الوصول مع تسجيل تدقيق كامل.
10. مراقبة الوصول غير المصرح به لملفات النسخ الاحتياطي باستخدام تنبيهات DLP وSIEM.
11. تدوير جميع بيانات الاعتماد والمفاتيح التي قد تظهر في إعدادات FortiOS كإجراء احترازي.

قواعد الكشف:
12. إنشاء تنبيهات SIEM لأي وصول إلى أدلة ملفات النسخ الاحتياطي لـ FortiOS أو نقل FTP/SFTP لملفات .conf.
13. مراقبة استخدام المفتاح المضمن المعروف في FortiOS في حركة الشبكة أو نشاط نظام الملفات.
14. مراجعة سجلات FortiGate لتسجيلات الدخول غير المصرح بها للمسؤولين التي قد تشير إلى إعادة استخدام بيانات الاعتماد من النسخ الاحتياطية المفككة.
15. نشر موجزات استخبارات التهديدات للكشف عن محاولات الاستغلال التي تستهدف أجهزة FortiOS.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Protection of sensitive configuration data ECC-2-3-1: Cryptographic controls and key management ECC-2-5-1: Secure configuration management for network devices ECC-2-6-3: Backup and recovery security controls ECC-3-3-2: Vulnerability and patch management
🔵 SAMA CSF
3.3.6 - Vulnerability Management: Timely patching of critical vulnerabilities 3.3.9 - Cryptography: Prohibition of hard-coded or weak cryptographic keys 3.3.14 - Network Security: Secure configuration of network perimeter devices 3.3.16 - Backup and Recovery: Secure storage and encryption of backup data 3.3.4 - Identity and Access Management: Credential management and rotation
🟡 ISO 27001:2022
A.8.24 - Use of cryptography: Proper key management and avoidance of hard-coded keys A.8.9 - Configuration management: Secure management of system configurations A.8.12 - Data leakage prevention: Protection of sensitive configuration data A.8.8 - Management of technical vulnerabilities: Timely patching A.5.17 - Authentication information: Secure management of credentials
🟣 PCI DSS v4.0
Requirement 2.2.1 - Configuration standards prohibiting use of vendor defaults and hard-coded credentials Requirement 3.5 - Protection of stored cryptographic keys Requirement 6.3.3 - All system components protected from known vulnerabilities via patching Requirement 12.3.2 - Targeted risk analysis for technology in use
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Fortinet:FortiOS
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS72.22%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-07-16
Published 2025-06-25
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.