First published: Tue Nov 14 2023(Updated: )
An improper access control vulnerability [CWE-284] in FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, 4.0 all may allow a local attacker to prevent the collector service to start in the next system reboot by tampering with some registry keys of the service.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiedr | >=5.0.3<=5.0.3.1007 | |
Fortinet Fortiedr | >=5.2.0<=5.2.0.4549 | |
Fortinet Fortiedr | =4.0.0 |
Please upgrade to FortiEDRCollectorWindows version 5.2.0.4581 or above Please upgrade to FortiEDRCollectorWindows version 5.0.3.1016 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44248 is an improper access control vulnerability in FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, 4.0 all, which may allow a local attacker to prevent the collector service from starting in the next system reboot by tampering with some registry keys.
The severity of CVE-2023-44248 is medium with a CVSS score of 5.5.
The improper access control vulnerability in FortiEDRCollectorWindows can be exploited by a local attacker who tampers with certain registry keys to prevent the collector service from starting in the next system reboot.
The affected software versions for CVE-2023-44248 are FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, and 4.0.0.
To mitigate the CVE-2023-44248 vulnerability, it is recommended to update FortiEDRCollectorWindows to a version that is not affected by the vulnerability.