First published: Thu Mar 09 2023(Updated: )
A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiDeceptor 3.1.x and before allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiDeceptor | >=1.0.0<3.2.0 |
Please upgrade to FortiAuthenticator version 6.5.0 or above, Please upgrade to FortiDeceptor version 3.2.0 or above. Please upgrade to FortiMail version 6.4.1 or above, Please upgrade to FortiMail version 6.2.5 or above, Please upgrade to FortiMail version 6.0.10 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-26209.
The title of this vulnerability is 'A improper restriction of excessive authentication attempts vulnerability [CWE-307] in Fortinet FortiDeceptor 3.1.x and before allows a remote unauthenticated attacker to partially exhaust CPU and memory via sending numerous HTTP requests to the login form.'
The severity of CVE-2023-26209 is medium with a CVSS score of 5.3.
The affected software for CVE-2023-26209 is Fortinet FortiDeceptor version 3.1.x and before.
The vulnerability can be exploited by a remote unauthenticated attacker sending numerous HTTP requests to the login form, which can partially exhaust the CPU and memory.