First published: Tue Nov 14 2023(Updated: )
An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 and before 6.4.8 may allow an unauthenticated attacker to perform a brute force attack on the affected endpoints via repeated login attempts.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | >=6.2.0<=6.2.9 | |
Fortinet FortiMail | >=6.4.0<=6.4.8 | |
Fortinet FortiMail | >=7.0.0<=7.0.6 | |
Fortinet FortiMail | >=7.2.0<=7.2.4 | |
Fortinet FortiMail | =7.4.0 |
Please upgrade to FortiMail version 7.4.1 or above Please upgrade to FortiMail version 7.2.5 or above Please upgrade to FortiMail version 7.0.7 or above Please upgrade to FortiMail version 6.4.9 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45582 is an improper restriction of excessive authentication attempts vulnerability in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, and before 6.4.8.
CVE-2023-45582 may allow an unauthenticated attacker to perform a brute force attack on the affected endpoints via repeated login attempts.
FortiMail versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, and before 6.4.8 are affected by CVE-2023-45582.
CVE-2023-45582 has a severity rating of 7.3, which is considered high.
To fix CVE-2023-45582, it is recommended to upgrade FortiMail to version 6.4.8 or higher, 7.0.6 or higher, or 7.2.4 or higher depending on the affected version.