First published: Mon Jun 03 2024(Updated: )
An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiweb Manager | >=6.2.3<6.2.5 | |
Fortinet Fortiweb Manager | >=7.0.0<7.0.5 | |
Fortinet Fortiweb Manager | =6.0.2 | |
Fortinet Fortiweb Manager | =6.3.0 | |
Fortinet Fortiweb Manager | =7.2.0 |
Please upgrade to FortiWebManager version 7.4.0 or above Please upgrade to FortiWebManager version 7.2.1 or above Please upgrade to FortiWebManager version 7.0.5 or above Please upgrade to FortiWebManager version 6.3.1 or above Please upgrade to FortiWebManager version 6.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23670 has been classified as a high-severity vulnerability due to its potential for unauthorized code execution.
To fix CVE-2024-23670, upgrade Fortinet FortiWebManager to a version that is not affected, such as those later than 7.0.5, 6.2.5, or 6.0.2.
CVE-2024-23670 affects Fortinet FortiWebManager versions 6.0.2, 6.2.3 through 6.2.4, 7.0.0 through 7.0.4, and 7.2.0.
An attacker can execute unauthorized code or commands via HTTP requests or the CLI due to improper authorization in CVE-2024-23670.
Yes, CVE-2024-23670 specifically affects Fortinet FortiWebManager.