First published: Wed Sep 11 2024(Updated: )
An improper authorization vulnerability [CWE-285] in FortiSOAR version 7.4.0 through 7.4.3, 7.3.0 through 7.3.2, 7.2.0 through 7.2.2, 7.0.0 through 7.0.3 change password endpoint may allow an authenticated attacker to perform a brute force attack on users and administrators password via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSOAR Imap Connector | >=7.4.0<=7.4.3>=7.3.0<=7.3.2>=7.2.0<=7.2.2>=7.0.0<=7.0.3 | |
Fortinet FortiSOAR Imap Connector | >=7.0.0<7.3.3 | |
Fortinet FortiSOAR Imap Connector | >=7.4.0<7.4.4 |
Please upgrade to FortiSOAR version 7.5.0 or above Please upgrade to FortiSOAR version 7.4.4 or above Please upgrade to FortiSOAR version 7.3.3 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45327 has been classified as a high severity vulnerability due to its potential for unauthorized access and brute force attacks.
To fix CVE-2024-45327, update FortiSOAR to version 7.4.4 or later to mitigate the vulnerability.
CVE-2024-45327 affects users of FortiSOAR versions 7.4.0 to 7.4.3, 7.3.0 to 7.3.2, 7.2.0 to 7.2.2, and 7.0.0 to 7.0.3.
CVE-2024-45327 is an improper authorization vulnerability that allows authenticated attackers to perform brute force password attacks.
An attacker exploiting CVE-2024-45327 could gain unauthorized access to user and administrator accounts by leveraging brute force attacks.