First published: Tue Feb 11 2025(Updated: )
An Exposure of Sensitive Information to an Unauthorized Actor [CWE-200] in the Log View component of FortiAnalyzer may allow a local authenticated user with admin privileges to view logs of devices not belonging to the current ADOM
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.4.0<7.6.0 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.4.0<=7.4.4 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.7 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 |
Please upgrade to FortiAnalyzer version 7.6.1 or above Please upgrade to FortiAnalyzer version 7.4.5 or above Please upgrade to FortiAnalyzer version 7.2.8 or above Please upgrade to FortiManager version 7.6.1 or above Please upgrade to FortiManager version 7.4.5 or above Please upgrade to FortiManager version 7.2.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52966 is classified as a medium severity vulnerability that allows exposure of sensitive information to unauthorized actors.
To resolve CVE-2024-52966, upgrade FortiAnalyzer to version 7.6.1 or later after ensuring you are running a vulnerable version.
CVE-2024-52966 affects FortiAnalyzer versions from 6.4.0 to 7.6.0, specifically when local authenticated users have admin privileges.
CVE-2024-52966 is an Exposure of Sensitive Information vulnerability as defined by CWE-200.
CVE-2024-52966 can allow a local authenticated user to view logs of devices not belonging to their current administrative domain, potentially leading to data leakage.