First published: Wed Dec 18 2024(Updated: )
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLM MEA for FortiManager | >=8.6.0<=8.6.5>=8.5.0<=8.5.4 |
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34990 is considered a critical vulnerability due to its potential to allow unauthorized code execution.
To mitigate CVE-2023-34990, upgrade Fortinet FortiWLM to version 8.6.6 or later, or 8.5.5 or later.
CVE-2023-34990 affects Fortinet FortiWLM versions 8.6.0 to 8.6.5 and 8.5.0 to 8.5.4.
CVE-2023-34990 exploits a relative path traversal vulnerability that can lead to unauthorized code execution.
The impacts of CVE-2023-34990 include execution of unauthorized commands, which may compromise the security of the affected systems.