First published: Mon Jun 03 2024(Updated: )
An improper removal of sensitive information before storage or transfer vulnerability [CWE-212] in FortiSOAR version 7.3.0, version 7.2.2 and below, version 7.0.3 and below may allow an authenticated low privileged user to read Connector passwords in plain-text via HTTP responses.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSOAR Imap Connector | <7.2.2<7.0.3 | |
Fortinet FortiSOAR Imap Connector | >=7.0.0<7.3.1 |
Please upgrade to FortiSOAR version 7.3.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31493 is classified as a critical severity vulnerability that allows unauthorized access to sensitive information.
To mitigate CVE-2024-31493, upgrade FortiSOAR to version 7.3.1 or later.
CVE-2024-31493 affects FortiSOAR versions 7.3.0, 7.2.2 and below, as well as 7.0.3 and below.
CVE-2024-31493 is an improper removal of sensitive information before storage or transfer vulnerability.
CVE-2024-31493 may allow low-privileged authenticated users to read Connector passwords in plain-text via HTTP responses.