First published: Tue Nov 14 2023(Updated: )
A use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0 allows an attacker to access Fortinet private testing data via the use of static credentials.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.0.0<=7.0.10 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.3 | |
Fortinet FortiAnalyzer | =7.4.0 | |
Fortinet FortiManager | >=7.0.0<=7.0.10 | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | =7.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40719 is a use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0.
An attacker can exploit CVE-2023-40719 by using static credentials to access Fortinet private testing data.
CVE-2023-40719 has a severity rating of 5.5 (medium).
CVE-2023-40719 affects Fortinet FortiAnalyzer versions 7.0.0 - 7.0.8, 7.2.0 - 7.2.3, and 7.4.0, as well as Fortinet FortiManager versions 7.0.0 - 7.0.8, 7.2.0 - 7.2.3, and 7.4.0.
Yes, Fortinet has released patches to address the hard-coded credentials vulnerability in FortiAnalyzer and FortiManager. It is recommended to update to the latest available version.