First published: Tue Mar 07 2023(Updated: )
An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4 and 6.4.0 through 6.4.10 may allow a remote authenticated attacker to read the client machine password in plain text in a heartbeat response when a log-fetch request is made from the FortiAnalyzer
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.4.0<6.4.11 | |
Fortinet FortiAnalyzer | >=7.0.0<7.0.5 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.2 |
Please upgrade to FortiAnalyzer version 7.2.2 or above Please upgrade to FortiAnalyzer version 7.0.5 or above Please upgrade to FortiAnalyzer version 6.4.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-23776.
The severity of CVE-2023-23776 is medium with a severity value of 3.1.
FortiAnalyzer versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, and 6.4.0 through 6.4.10 are affected by CVE-2023-23776.
A remote authenticated attacker can exploit CVE-2023-23776 by reading the client machine password in plain text in a heartbeat response.
Yes, you can find more information about CVE-2023-23776 at the following link: https://fortiguard.com/psirt/FG-IR-22-447.