First published: Tue May 14 2024(Updated: )
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiVoice | >=6.0.0<=6.0.12 | |
Fortinet FortiVoice | >=6.4.0<=6.4.8 | |
Fortinet FortiVoice | =7.0.0 | |
Fortinet FortiVoice | =7.0.1 |
Please upgrade to FortiVoice version 7.0.2 or above Please upgrade to FortiVoice version 6.4.9 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.