First published: Tue Nov 12 2024(Updated: )
A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData at least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiManager version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14 allows attacker to improper access control via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.4.0<6.4.15 | |
Fortinet FortiAnalyzer | >=7.0.0<7.0.13 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.6 | |
Fortinet FortiAnalyzer | >=7.4.0<7.4.3 | |
Fortinet FortiAnalyzer BigData | >=6.2.1<7.2.7 | |
Fortinet FortiAnalyzer BigData | =7.4.0 | |
Fortinet FortiManager | >=6.4.0<6.4.15 | |
Fortinet FortiManager | >=7.0.0<7.0.13 | |
Fortinet FortiManager | >=7.2.0<7.2.6 | |
Fortinet FortiManager | >=7.4.0<7.4.3 | |
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.12 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.14 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.6 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0.0<=7.0.12 | |
Fortinet FortiManager | >=6.4.0<=6.4.14 |
Please upgrade to FortiAnalyzer-BigData version 7.4.1 or above Please upgrade to FortiAnalyzer-BigData version 7.2.7 or above Please upgrade to FortiManager version 7.4.3 or above Please upgrade to FortiManager version 7.2.6 or above Please upgrade to FortiManager version 7.0.13 or above Please upgrade to FortiManager version 6.4.15 or above Please upgrade to FortiAnalyzer version 7.4.3 or above Please upgrade to FortiAnalyzer version 7.2.6 or above Please upgrade to FortiAnalyzer version 7.0.13 or above Please upgrade to FortiAnalyzer version 6.4.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-23666 is currently classified as critical due to its potential impact on exploitation of client-side enforcement failures.
To fix CVE-2024-23666, update FortiAnalyzer to version 7.4.3 or higher, FortiManager to 7.4.3 or higher, and FortiAnalyzer-BigData to at least 7.4.1.
CVE-2024-23666 affects FortiAnalyzer, FortiManager, and FortiAnalyzer-BigData versions ranging from 6.2.5 to 7.4.2.
As of the latest reports, there is no indication that CVE-2024-23666 is being actively exploited in the wild.
CVE-2024-23666 is a client-side enforcement of server-side security vulnerability that may allow unauthorized access to sensitive data.