First published: Thu Mar 09 2023(Updated: )
A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiAuthenticator 6.4.x and before allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAuthenticator | >=5.4.0<6.5.0 |
Please upgrade to FortiAuthenticator version 6.5.0 or above, Please upgrade to FortiDeceptor version 3.2.0 or above. Please upgrade to FortiMail version 6.4.1 or above, Please upgrade to FortiMail version 6.2.5 or above, Please upgrade to FortiMail version 6.0.10 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-26208.
The title of the vulnerability is 'A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiAuthenticator 6.4.x and before'.
The vulnerability allows a remote unauthenticated attacker to partially exhaust CPU and memory by sending numerous HTTP requests to the login form.
Fortinet FortiAuthenticator versions 6.4.x and before are affected by the vulnerability.
The severity of the vulnerability is medium with a CVSS score of 5.3.
To fix the vulnerability, update your Fortinet FortiAuthenticator to a version above 6.5.0.
You can find additional reference for the vulnerability at https://fortiguard.com/psirt/FG-IR-20-078.