First published: Wed Jan 10 2024(Updated: )
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in FortiVoiceEntreprise version 7.0.0 and before 6.4.7 allows an authenticated attacker to read arbitrary files from the system via sending crafted HTTP or HTTPS requests
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiVoice | >=6.0.0<=6.0.12 | |
Fortinet FortiVoice | >=6.4.0<6.4.8 | |
Fortinet FortiVoice | =7.0.0 |
Please upgrade to FortiVoice version 7.0.1 or above Please upgrade to FortiVoice version 6.4.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37932 has a high severity rating due to the potential for an authenticated attacker to exploit the vulnerability and access sensitive files.
CVE-2023-37932 affects FortiVoice versions 7.0.0, 6.4.0 through 6.4.7, and 6.0.0 through 6.0.12.
To fix CVE-2023-37932, upgrade FortiVoice to version 6.4.8 or later, or to version 7.0.1 or later.
CVE-2023-37932 enables a path traversal attack, allowing attackers to read arbitrary files from the system.
Yes, CVE-2023-37932 requires the attacker to be authenticated to the FortiVoice system to exploit the vulnerability.