First published: Thu Mar 09 2023(Updated: )
A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiMail version 6.4.0, version 6.2.0 through 6.2.4 and before 6.0.9 allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | >=6.0.0<6.0.10 | |
Fortinet FortiMail | >=6.2.1<6.2.5 | |
Fortinet FortiMail | =6.4.0 |
Please upgrade to FortiAuthenticator version 6.5.0 or above, Please upgrade to FortiDeceptor version 3.2.0 or above. Please upgrade to FortiMail version 6.4.1 or above, Please upgrade to FortiMail version 6.2.5 or above, Please upgrade to FortiMail version 6.0.10 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Fortinet FortiMail vulnerability is CVE-2022-29056.
The severity of CVE-2022-29056 is medium (5.3).
Fortinet FortiMail versions 6.4.0, 6.2.0 through 6.2.4, and versions before 6.0.9 are affected by CVE-2022-29056.
CVE-2022-29056 allows a remote unauthenticated attacker to partially exhaust CPU and memory by sending numerous HTTP requests to the login form.
Yes, upgrading to Fortinet FortiMail version 6.0.10, 6.2.5, or 6.4.1, or above will fix CVE-2022-29056.