First published: Tue Mar 12 2024(Updated: )
A improper access control in Fortinet FortiManager version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.10, version 6.4.0 through 6.4.13, 6.2 all versions allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | >=6.2.0<=6.2.12 | |
Fortinet FortiManager | >=6.4.0<=6.4.13 | |
Fortinet FortiManager | >=7.0.0<=7.0.10 | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | =7.4.0 | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.10 | |
Fortinet FortiManager | >=6.4.0<=6.4.13 | |
Fortinet FortiManager | >=6.2 |
Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.11 or above Please upgrade to FortiManager version 6.4.14 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-36554 has been rated as critical due to the ability of an attacker to execute unauthorized code or commands.
To fix CVE-2023-36554, upgrade Fortinet FortiManager to version 7.4.1 or later, 7.2.4 or later, 7.0.11 or later, or 6.4.14 or later.
CVE-2023-36554 affects Fortinet FortiManager versions 6.2.x, 6.4.x, 7.0.x, 7.2.x, and 7.4.0.
CVE-2023-36554 is classified as an improper access control vulnerability.
Yes, CVE-2023-36554 can be exploited remotely through specially crafted HTTP requests.