First published: Tue Nov 12 2024(Updated: )
An Exposure of personal information to an unauthorized actor [CWE-359] in FortiManager, FortiAnalyzer & FortiAnalyzer-BigData may allow a privileged attacker with administrative read permissions to read event logs of another adom via crafted HTTP or HTTPs requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.2.0<7.4.3 | |
Fortinet FortiAnalyzer BigData | >=6.2.1<7.2.6 | |
Fortinet FortiManager | >=6.2.0<7.4.3 | |
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Please upgrade to FortiManager version 7.4.3 or above Please upgrade to FortiAnalyzer version 7.4.3 or above Please upgrade to FortiAnalyzer-BigData version 7.4.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-44255 has been classified as a significant vulnerability due to its potential to expose sensitive event logs to unauthorized actors.
To mitigate CVE-2023-44255, upgrade FortiManager and FortiAnalyzer to version 7.4.3 or later.
CVE-2023-44255 affects several versions of FortiManager and FortiAnalyzer, specifically versions prior to 7.4.3.
CVE-2023-44255 can be exploited by a privileged attacker with administrative read permissions.
CVE-2023-44255 involves the exposure of event logs from one administrative domain to another.