First published: Tue Mar 12 2024(Updated: )
An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2.6 and below, and versions 7.0.12 and below when configured with FortiAuthenticator in HA may allow a readonly user to gain read-write access via successive login attempts.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.0.0<7.0.13 | |
Fortinet FortiOS IPS Engine | >=7.2.0<7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.2 |
Please upgrade to FortiOS 7.4.2 or above Please upgrade to FortiOS 7.2.7 or above Please upgrade to ForitOS 7.0.13 or above Workaround- Disable push notifications for FortiAuthenticator: For RADIUS Authentication (From FortiAuthenticator)- ## RADIUS Service > Policies > (select policy) > Authentication Factors > Advanced Options > ## Allow FortiToken Mobile push notifications (*disable)*
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-46717 is classified as a high severity vulnerability due to its potential to allow unauthorized read-write access.
To fix CVE-2023-46717, upgrade FortiOS to versions 7.0.13, 7.2.7, or 7.4.2 or above.
CVE-2023-46717 affects FortiOS versions 7.4.1 and below, 7.2.6 and below, and 7.0.12 and below when configured with FortiAuthenticator in HA.
CVE-2023-46717 is an improper authentication vulnerability categorized under CWE-287.
Yes, a readonly user may gain unauthorized read-write access through repeated login attempts due to CVE-2023-46717.