First published: Mon Jun 03 2024(Updated: )
An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiweb Manager | >=6.2.3<6.2.5 | |
Fortinet Fortiweb Manager | >=7.0.0<7.0.5 | |
Fortinet Fortiweb Manager | =6.0.2 | |
Fortinet Fortiweb Manager | =6.3.0 | |
Fortinet Fortiweb Manager | =7.2.0 |
Please upgrade to FortiWebManager version 7.4.0 or above Please upgrade to FortiWebManager version 7.2.1 or above Please upgrade to FortiWebManager version 7.0.5 or above Please upgrade to FortiWebManager version 6.3.1 or above Please upgrade to FortiWebManager version 6.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23668 is considered a high-severity vulnerability due to improper authorization allowing attackers to execute unauthorized commands.
To remediate CVE-2024-23668, upgrade to FortiWebManager version 7.2.1 or later, or apply the appropriate patches as specified by Fortinet.
CVE-2024-23668 affects FortiWebManager versions 6.0.2, 6.2.3 to 6.2.4, 7.0.0 to 7.0.4, and 7.2.0.
CVE-2024-23668 allows attackers to issue unauthorized commands via HTTP requests or command-line interface, potentially compromising the system.
Yes, CVE-2024-23668 can be exploited remotely through the web interface or CLI of the affected FortiWebManager versions.