First published: Wed Jan 05 2022(Updated: )
A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | <=6.0.9 | |
Fortinet FortiMail | =6.2.0 | |
Fortinet FortiMail | =6.2.1 | |
Fortinet FortiMail | =6.2.2 | |
Fortinet FortiMail | =6.2.3 | |
Fortinet FortiMail | =6.2.4 | |
Fortinet FortiMail | =6.4.0 | |
Fortinet FortiMail | =6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15933 is a vulnerability that allows an unauthorized actor to obtain potentially sensitive software-version information in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below, and FortiMail versions 6.4.1 and 6.4.0.
CVE-2020-15933 has a severity rating of 5.3, which is considered medium.
The affected software for CVE-2020-15933 includes Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below, and FortiMail versions 6.4.1 and 6.4.0.
An unauthorized actor can exploit CVE-2020-15933 by inspecting client-side resources to obtain potentially sensitive software-version information.
Yes, Fortinet has released updates to address the vulnerability in FortiMail versions 6.0.10, 6.2.5, and 6.4.2. It is recommended to update to the latest version to mitigate the risk.