First published: Tue Jul 09 2024(Updated: )
An improper access control vulnerability [CWE-284] in Fortinet FortiADC version 7.4.0 through 7.4.1 and before 7.2.4 allows a read only authenticated attacker to perform some write actions via crafted HTTP or HTTPS requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=6.0.0<7.2.5 | |
Fortinet FortiADC | >=7.4.0<7.4.2 |
Please upgrade to FortiADC version 7.4.2 or above Please upgrade to FortiADC version 7.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50181 is considered a significant access control vulnerability that can allow unauthorized modifications by authenticated attackers.
To mitigate CVE-2023-50181, upgrade Fortinet FortiADC to version 7.4.2 or newer, or to version 7.2.4 or newer.
CVE-2023-50181 affects Fortinet FortiADC versions from 6.0.0 up to 7.4.1 and includes both older and newer versions before 7.2.4.
CVE-2023-50181 can be exploited by an authenticated attacker who can send specially crafted HTTP or HTTPS requests to perform unauthorized write operations.
Currently, the best course of action for CVE-2023-50181 is to apply the appropriate software updates as there are no specific workarounds recommended.