First published: Thu Sep 07 2023(Updated: )
An improper access control in Fortinet FortiSwitchManager version 7.2.0 through 7.2.2 7.0.0 through 7.0.1 may allow a remote authenticated read-only user to modify the interface settings via the API.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSwitchManager | =7.0.0 | |
Fortinet FortiSwitchManager | =7.0.1 | |
Fortinet FortiSwitchManager | =7.2.0 | |
Fortinet FortiSwitchManager | =7.2.1 | |
Fortinet FortiSwitchManager | =7.2.2 |
Please upgrade to FortiOS version 7.2.1 or above Please upgrade to FortiOS version 7.0.8 or above Please upgrade to FortiSwitchManager version 7.2.2 or above Please upgrade to FortiSwitchManager version 7.0.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-36635.
The severity of CVE-2023-36635 is high (4.3).
Fortinet FortiSwitchManager versions 7.0.0, 7.0.1, 7.2.0, 7.2.1, and 7.2.2 are affected by CVE-2023-36635.
CVE-2023-36635 may allow a remote authenticated read-only user to modify the interface settings via the API.
Yes, you can find additional information about CVE-2023-36635 on the FortiGuard PSIRT website: https://fortiguard.com/psirt/FG-IR-22-174