From ee3726735e66476d3aebea5896d2a46972f00397 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 6 Jul 2023 10:51:57 +0530 Subject: [PATCH] Update auto-usb-install.yaml --- file/audit/fortigate/auto-usb-install.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/file/audit/fortigate/auto-usb-install.yaml b/file/audit/fortigate/auto-usb-install.yaml index 4f29327cad..7c2c04c328 100644 --- a/file/audit/fortigate/auto-usb-install.yaml +++ b/file/audit/fortigate/auto-usb-install.yaml @@ -1,7 +1,7 @@ id: auto-usb-install info: - name: Fortinet Auto USB Installation - Detect + name: Fortinet Auto USB Installation Enabled - Detect author: pussycat0x severity: info description: Via Fortinet Auto USB installation, an attacker with physical access to a FortiGate can load a new configuration or firmware using the USB port, thereby potentially being able to obtain sensitive information, modify data, and/or execute unauthorized operations.