First published: Tue Mar 07 2023(Updated: )
An uncontrolled resource consumption vulnerability [CWE-400] in FortiRecorder version 6.4.3 and below, 6.0.11 and below login authentication mechanism may allow an unauthenticated attacker to make the device unavailable via crafted GET requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortirecorder Firmware | >=6.0.0<=6.0.11 | |
Fortinet Fortirecorder Firmware | >=6.4.0<=6.4.3 |
Please upgrade to FortiRecorder version 7.0.0 or above Please upgrade to FortiRecorder version 6.4.4 or above Please upgrade to FortiRecorder version 6.0.12 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41333 is an uncontrolled resource consumption vulnerability in FortiRecorder version 6.4.3 and below, 6.0.11 and below login authentication mechanism.
CVE-2022-41333 has a severity rating of 7.5 (high).
CVE-2022-41333 may allow an unauthenticated attacker to make the FortiRecorder device unavailable via crafted GET requests.
FortiRecorder versions 6.4.3 and below, and 6.0.11 and below are affected by CVE-2022-41333.
To mitigate the CVE-2022-41333 vulnerability, it is recommended to update FortiRecorder to a version that is not affected.