First published: Tue Jan 14 2025(Updated: )
An insertion of sensitive information into sent data vulnerability [CWE-201] in FortiOS 7.6.0, 7.4.0 through 7.4.4 may allow an attacker in a man-in-the-middle position to retrieve the RADIUS accounting server shared secret via intercepting accounting-requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | =. | |
FortiOS | >=7.4.0<=7.4.4 | |
FortiOS | >=7.4.0<7.4.5 | |
FortiOS | =7.6.0 |
Please upgrade to FortiOS version 7.6.1 or above Please upgrade to FortiOS version 7.4.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46665 has a high severity rating due to the potential for sensitive information leakage.
To fix CVE-2024-46665, update FortiOS to version 7.6.1 or 7.4.5 and above.
FortiOS versions 7.4.0 through 7.4.4 and 7.6.0 are affected by CVE-2024-46665.
Organizations using the affected versions of FortiOS may be vulnerable to CVE-2024-46665.
CVE-2024-46665 is classified as an injection vulnerability that exposes sensitive information.