First published: Tue Nov 14 2023(Updated: )
An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 and before 6.4.8 may allow an unauthenticated attacker to perform a brute force attack on the affected endpoints via repeated login attempts.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | >=6.2.0<=6.2.9 | |
Fortinet FortiMail | >=6.4.0<=6.4.8 | |
Fortinet FortiMail | >=7.0.0<=7.0.6 | |
Fortinet FortiMail | >=7.2.0<=7.2.4 | |
Fortinet FortiMail | =7.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45582 is an improper restriction of excessive authentication attempts vulnerability in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, and before 6.4.8.
CVE-2023-45582 may allow an unauthenticated attacker to perform a brute force attack on the affected endpoints via repeated login attempts.
FortiMail versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, and before 6.4.8 are affected by CVE-2023-45582.
CVE-2023-45582 has a severity rating of 7.3, which is considered high.
To fix CVE-2023-45582, it is recommended to upgrade FortiMail to version 6.4.8 or higher, 7.0.6 or higher, or 7.2.4 or higher depending on the affected version.