First published: Wed Jun 05 2024(Updated: )
An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiweb Manager | >=6.2.3<6.2.5 | |
Fortinet Fortiweb Manager | >=7.0.0<7.0.5 | |
Fortinet Fortiweb Manager | =6.0.2 | |
Fortinet Fortiweb Manager | =6.3.0 | |
Fortinet Fortiweb Manager | =7.2.0 |
Please upgrade to FortiWebManager version 7.4.0 or above Please upgrade to FortiWebManager version 7.2.1 or above Please upgrade to FortiWebManager version 7.0.5 or above Please upgrade to FortiWebManager version 6.3.1 or above Please upgrade to FortiWebManager version 6.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23669 has been classified as critical due to its potential to allow unauthorized code execution.
To fix CVE-2024-23669, users should upgrade to the latest version of Fortinet FortiWebManager that is not affected by this vulnerability.
CVE-2024-23669 affects Fortinet FortiWebManager versions 7.0.0 through 7.0.4, 6.2.3 through 6.2.4, 6.3.0, and 6.0.2.
Attackers can exploit CVE-2024-23669 to execute unauthorized commands via HTTP requests or command line interface.
There are no specific workarounds documented for CVE-2024-23669; the recommended action is to apply the security updates.