First published: Tue Sep 10 2024(Updated: )
An improper access control vulnerability [CWE-284] in FortiEDR Manager API 6.2.0 through 6.2.2, 6.0 all versions may allow in a shared environment context an authenticated admin with REST API permissions in his profile and restricted to a specific organization to access backend logs that include information related to other organizations.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiedrmanager | >=6.2.0<6.2.2 | |
Fortinet Fortiedrmanager | =6.0.1 |
Please upgrade to FortiEDR Manager version 6.2.3 or above Please upgrade to FortiEDR Manager version 6.0.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45323 is categorized as a critical vulnerability due to its potential impact on access control in the FortiEDR Manager API.
To mitigate CVE-2024-45323, it is recommended to update FortiEDR Manager to the latest version that addresses the improper access control issues.
CVE-2024-45323 affects FortiEDR Manager versions 6.2.0 to 6.2.2 and all versions of 6.0, including 6.0.1.
CVE-2024-45323 is an improper access control vulnerability that allows unauthorized access to sensitive backend logs.
Administrators with REST API permissions restricted to a specific organization in shared environments may be impacted by CVE-2024-45323.