First published: Tue Oct 10 2023(Updated: )
An authorization bypass through user-controlled key [CWE-639] vulnerability in FortiManager & FortiAnalyzer may allow a remote attacker with low privileges to read sensitive information via crafted HTTP requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.2.0<=6.2.12 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.13 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.9 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.3 | |
Fortinet FortiAnalyzer | =7.4.0 | |
Fortinet FortiManager | >=6.2.0<=6.2.12 | |
Fortinet FortiManager | >=6.4.0<=6.4.13 | |
Fortinet FortiManager | >=7.0.0<=7.0.9 | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | =7.4.0 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.4 | |
Fortinet FortiManager | >=7.2.0<7.2.4 | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.9 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-44249.
The severity of CVE-2023-44249 is medium with a CVSS score of 6.5.
Fortinet FortiManager versions 7.4.0 and before 7.2.3, and FortiAnalyzer versions 7.4.0 and before 7.2.3 are affected by CVE-2023-44249.
CVE-2023-44249 is an authorization bypass vulnerability that allows a remote attacker with low privileges to read sensitive information through crafted HTTP requests.
Yes, it is recommended to update to Fortinet FortiManager version 7.4.0 or 7.2.3, and FortiAnalyzer version 7.4.0 or 7.2.3 to fix CVE-2023-44249.