First published: Fri Oct 13 2023(Updated: )
A insufficient session expiration in Fortinet FortiEDR version 5.0.0 through 5.0.1 allows attacker to execute unauthorized code or commands via api request
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiedr | >=5.0.0<=5.0.1 |
Please upgrade to FortiEDR version 5.2.0.2501 or above Please upgrade to FortiEDR version 5.0.3.873 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-33303.
The title of this vulnerability is 'Insufficient Session Expiration in Fortinet FortiEDR version 5.0.0 through 5.0.1 allows attacker to execute unauthorized code or commands via API request.'
The severity of CVE-2023-33303 is high.
The affected software of this vulnerability is Fortinet FortiEDR version 5.0.0 through 5.0.1.
An attacker can exploit this vulnerability by executing unauthorized code or commands via API request.