First published: Tue Mar 11 2025(Updated: )
An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSIEM Windows Agent | >=6.7.0<=6.7.4>=6.6.0<=6.6.3>=6.5.0<=6.5.1>=6.4.0<=6.4.2>=6.3.0<=6.3.3>=6.2.0<=6.2.1>=6.1.0<=6.1.2>=5.3.0<=5.3.3>=5.2.5<=5.2.8>=5.2.1<=5.2.2>=5.1.0<=5.1.3 |
Please upgrade to FortiSIEM version 7.0.2 or above Please upgrade to FortiSIEM version 7.0.0 or above Please upgrade to FortiSIEM version 6.7.5 or above Please upgrade to FortiSIEM version 6.6.4 or above Please upgrade to FortiSIEM version 6.5.2 or above Please upgrade to FortiSIEM version 6.4.3 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40723 is rated as a medium severity vulnerability due to exposure of sensitive information.
To fix CVE-2023-40723, you should upgrade Fortinet FortiSIEM to the latest patched version.
CVE-2023-40723 affects Fortinet FortiSIEM versions from 5.2.5 to 6.7.4 inclusive.
CVE-2023-40723 is an exposure of sensitive information vulnerability.
Yes, CVE-2023-40723 can potentially be exploited by unauthorized actors remotely.