First published: Tue Jan 09 2024(Updated: )
An improper privilege management vulnerability [CWE-269] in a Fortinet FortiOS HA cluster version 7.4.0 through 7.4.1 and 7.2.5 and in a FortiProxy HA cluster version 7.4.0 through 7.4.1 allows an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 | |
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiProxy | >=7.4.0<=7.4.1 | |
Fortinet FortiProxy | =7.4.0 | |
Fortinet FortiProxy | =7.4.1 | |
Fortinet FortiOS IPS Engine | =7.2.5 | |
Fortinet FortiOS IPS Engine | =7.4.0 | |
Fortinet FortiOS IPS Engine | =7.4.1 |
Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.6 or above Please upgrade to FortiProxy version 7.4.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-44250 is categorized as a high-risk vulnerability due to its potential for privilege escalation by authenticated users.
To fix CVE-2023-44250, upgrade FortiOS to version 7.4.2 or later, or FortiProxy to version 7.4.2 or later.
FortiOS versions 7.4.0, 7.4.1, and 7.2.5 are affected by CVE-2023-44250.
CVE-2023-44250 is a local vulnerability as it requires authenticated access to exploit.
An attacker can perform elevated actions on Fortinet FortiOS and FortiProxy systems through crafted HTTP or HTTPS requests.