First published: Tue Sep 10 2024(Updated: )
An authorization bypass through user-controlled key [CWE-639] vulnerability in FortiAnalyzer & FortiManager may allow a remote attacker with low privileges to read sensitive data via a crafted HTTP request.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.2.0<7.2.5 | |
Fortinet FortiAnalyzer | =7.4.0 | |
Fortinet FortiManager | >=6.2.0<7.2.5 | |
Fortinet FortiManager | =7.4.0 | |
Fortinet FortiAnalyzer BigData | >=7.2.0<=7.2.5 |
Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.5 or above Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.5 or above Please upgrade to FortiAnalyzer-BigData version 7.4.0 or above Please upgrade to FortiAnalyzer-BigData version 7.2.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44254 has a medium severity rating due to its potential for unauthorized access to sensitive data.
To fix CVE-2023-44254, update FortiAnalyzer and FortiManager to the latest versions that address this vulnerability.
CVE-2023-44254 affects FortiAnalyzer versions from 6.2.0 to 7.2.5 and version 7.4.0, as well as FortiManager versions from 6.2.0 to 7.2.5 and version 7.4.0.
CVE-2023-44254 involves an authorization bypass allowing remote attackers to read sensitive data through crafted HTTP requests.
Yes, low privilege users can exploit CVE-2023-44254 to bypass authorization controls and access sensitive information.