First published: Tue Mar 11 2025(Updated: )
A cross site request forgery vulnerability [CWE-352] in Fortinet FortiNDR version 7.4.0, 7.2.0 through 7.2.1 and 7.1.0 through 7.1.1 and before 7.0.5 may allow a remote unauthenticated attacker to execute unauthorized actions via crafted HTTP GET requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiNDR | >=7.2.0<7.2.1>=7.1.0<7.1.1<7.0.5 |
Please upgrade to FortiNDR version 7.4.1 or above Please upgrade to FortiNDR version 7.2.2 or above Please upgrade to FortiNDR version 7.1.2 or above Please upgrade to FortiNDR version 7.0.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48790 is classified as a high severity vulnerability due to its potential for unauthorized actions via crafted HTTP GET requests.
To fix CVE-2023-48790, upgrade Fortinet FortiNDR to version 7.4.0 or apply the relevant patches for affected versions.
CVE-2023-48790 affects users of Fortinet FortiNDR versions 7.2.0 through 7.2.1, 7.1.0 through 7.1.1, and versions before 7.0.5.
CVE-2023-48790 is classified as a cross site request forgery (CSRF) vulnerability according to CWE-352.
Yes, CVE-2023-48790 can be exploited remotely by unauthenticated attackers through specially crafted HTTP GET requests.