First published: Tue Jan 14 2025(Updated: )
An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiSIEM ersion 7.1.7 and below, version 7.1.0, version 7.0.3 and below, version 6.7.9 and below, 6.7.8, version 6.6.5 and below, version 6.5.3 and below, version 6.4.4 and below Update/Create Case feature may allow an authenticated attacker to extract database information via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSIEM | <7.1.8<7.0.4<6.7.10<6.6.6<6.5.4<6.4.5 | |
Fortinet FortiSIEM | >=6.4.0<=7.1.7 |
Please upgrade to FortiSIEM version 7.2.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52969 is classified as a critical SQL Injection vulnerability.
To remediate CVE-2024-52969, upgrade FortiSIEM to version 7.1.8 or later.
CVE-2024-52969 affects FortiSIEM versions 7.1.7 and below, as well as several earlier versions.
CVE-2024-52969 can be exploited remotely through crafted SQL commands.
CVE-2024-52969 is an Improper Neutralization of Special Elements used in an SQL Command, also known as SQL Injection.