First published: Tue Nov 14 2023(Updated: )
A use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0 allows an attacker to access Fortinet private testing data via the use of static credentials.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.0.0<=7.0.10 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.3 | |
Fortinet FortiAnalyzer | =7.4.0 | |
Fortinet FortiManager | >=7.0.0<=7.0.10 | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | =7.4.0 |
Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40719 is a use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0.
An attacker can exploit CVE-2023-40719 by using static credentials to access Fortinet private testing data.
CVE-2023-40719 has a severity rating of 5.5 (medium).
CVE-2023-40719 affects Fortinet FortiAnalyzer versions 7.0.0 - 7.0.8, 7.2.0 - 7.2.3, and 7.4.0, as well as Fortinet FortiManager versions 7.0.0 - 7.0.8, 7.2.0 - 7.2.3, and 7.4.0.
Yes, Fortinet has released patches to address the hard-coded credentials vulnerability in FortiAnalyzer and FortiManager. It is recommended to update to the latest available version.