First published: Tue May 14 2024(Updated: )
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiVoice Enterprise | >=6.0.0<=6.0.12 | |
Fortinet FortiVoice Enterprise | >=6.4.0<=6.4.8 | |
Fortinet FortiVoice Enterprise | =7.0.0 | |
Fortinet FortiVoice Enterprise | =7.0.1 |
Please upgrade to FortiVoice version 7.0.2 or above Please upgrade to FortiVoice version 6.4.9 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40720 is considered a critical vulnerability due to its potential for information disclosure and exploitation by authenticated attackers.
To fix CVE-2023-40720, upgrade to FortiVoice versions 7.0.2 or later, or to versions 6.4.9 or later.
CVE-2023-40720 affects users of FortiVoice Enterprise versions 7.0.0, 7.0.1, and those before 6.4.8.
CVE-2023-40720 is categorized as an authorization bypass through user-controlled key vulnerability.
No, CVE-2023-40720 requires an authenticated user to exploit the vulnerability.