First published: Tue Nov 03 2020(Updated: )
An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiMail may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortimail-200d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-20-105 is considered to be critical due to the risk of unauthorized access to sensitive software-version information.
To fix FG-IR-20-105, Fortinet users should update their FortiMail to the latest version that includes patches addressing this vulnerability.
The FG-IR-20-105 vulnerability affects users of Fortinet FortiMail software, particularly those running vulnerable versions.
FG-IR-20-105 can expose sensitive software-version information to unauthorized attackers.
Yes, FG-IR-20-105 can be exploited remotely by unauthenticated attackers.