First published: Tue Oct 10 2023(Updated: )
A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.2.0<=6.2.12 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.13 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.9 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.3 | |
Fortinet FortiAnalyzer | =7.4.0 |
Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above AND Configure the "un-encrypted-logging" option to disable receiving syslog without encryption through UDP(514) or TCP(514). config system log setting set un-encrypted-logging disable
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-42782.
The severity of CVE-2023-42782 is medium with a severity value of 5.3.
FortiAnalyzer versions 6.2.0 to 6.2.12, 6.4.0 to 6.4.13, 7.0.0 to 7.0.9, and 7.2.0 to 7.2.3 are affected by CVE-2023-42782.
CVE-2023-42782 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer using the knowledge of an authorized device serial number.
Yes, Fortinet has released a fix for CVE-2023-42782. It is recommended to upgrade to FortiAnalyzer version 7.4.1 or later.