First published: Mon Jun 03 2024(Updated: )
An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiweb Manager | >=6.2.3<6.2.5 | |
Fortinet Fortiweb Manager | >=7.0.0<7.0.5 | |
Fortinet Fortiweb Manager | =6.0.2 | |
Fortinet Fortiweb Manager | =6.3.0 | |
Fortinet Fortiweb Manager | =7.2.0 |
Please upgrade to FortiWebManager version 7.4.0 or above Please upgrade to FortiWebManager version 7.2.1 or above Please upgrade to FortiWebManager version 7.0.5 or above Please upgrade to FortiWebManager version 6.3.1 or above Please upgrade to FortiWebManager version 6.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23667 has been classified with high severity due to its potential for unauthorized code execution.
To mitigate CVE-2024-23667, update Fortinet FortiWebManager to the latest version that is not vulnerable to this issue.
CVE-2024-23667 impacts Fortinet FortiWebManager versions 6.0.2, 6.2.3 to 6.2.4, 7.0.0 to 7.0.4, and 7.2.0.
Yes, CVE-2024-23667 can be exploited remotely via HTTP requests or command line interface.
CVE-2024-23667 allows attackers to execute unauthorized commands or code on a vulnerable FortiWebManager instance.