First published: Tue Jan 14 2025(Updated: )
An Improper Access Control vulnerability [CWE-284] in FortiDeceptor version 6.0.0, version 5.3.3 and below, version 5.2.1 and below, version 5.1.0, version 5.0.0 may allow an authenticated attacker with none privileges to perform operations on the central management appliance via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiDeceptor | <5.3.3<5.2.1 | |
Fortinet FortiDeceptor | >=5.0.0<6.0.1 |
Please upgrade to FortiDeceptor version 6.1.0 or above Please upgrade to FortiDeceptor version 6.0.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45326 has been classified as having a high severity due to its potential impact on access control.
To fix CVE-2024-45326, upgrade to FortiDeceptor version 6.0.1 or later.
CVE-2024-45326 affects FortiDeceptor versions 5.3.3 and below, as well as 5.2.1 and earlier.
Authenticated users with no privileges on affected FortiDeceptor versions can exploit CVE-2024-45326.
CVE-2024-45326 is categorized as an Improper Access Control vulnerability.