First published: Tue May 14 2024(Updated: )
An improper neutralization of inputs during web page generation vulnerability [CWE-79] in FortiNAC version 9.4.0 through 9.4.4, 9.2.0 through 9.2.8, 9.1.0 through 9.1.10, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 7.2.0 through 7.2.3 may allow a remote authenticated attacker to perform stored and reflected cross site scripting (XSS) attack via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiNAC | >=9.4.0<=9.4.4>=9.2.0<9.2.9>=9.1.0<9.1.11>=8.8.0<8.8.12>=8.7.0<8.7.7>=7.2.0<7.2.4 | |
Fortinet FortiNAC | >=7.2.0<7.2.4 | |
Fortinet FortiNAC | >=8.7.0<9.4.5 |
Please upgrade to FortiNAC version 9.4.5 or above Please upgrade to FortiNAC version 7.4.0 or above Please upgrade to FortiNAC version 7.2.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31488 has been classified as a medium severity vulnerability.
To fix CVE-2024-31488, upgrade FortiNAC to versions 9.4.5, 9.2.9, 9.1.11, 8.8.12, 8.7.7, or 7.2.4 or later.
CVE-2024-31488 affects FortiNAC versions 9.4.0 through 9.4.4, 9.2.0 through 9.2.8, 9.1.0 through 9.1.10, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, and 7.2.0 through 7.2.3.
CVE-2024-31488 is an improper neutralization of inputs during web page generation vulnerability.
Yes, CVE-2024-31488 may allow a remote authenticated attacker to perform stored cross-site scripting (XSS) attacks.