First published: Mon Jun 12 2023(Updated: )
A server-side request forgery (SSRF) vulnerability [CWE-918] in FortiManager and FortiAnalyzer GUI may allow a remote and authenticated attacker to access unauthorized files and services on the system via specially crafted web requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.2.0<=7.2.1 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.6 | |
Fortinet FortiAnalyzer | >=6.4.8<=6.4.11 | |
Fortinet FortiManager | >=7.2.0<=7.2.1 | |
Fortinet FortiManager | >=7.0.0<=7.0.6 | |
Fortinet FortiManager | >=6.4.8<=6.4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-22-493 vulnerability has a high severity rating due to its potential for unauthorized access to sensitive files and services.
To mitigate FG-IR-22-493, update FortiManager and FortiAnalyzer to versions 7.2.2 or later, 7.0.7 or later, or 6.4.12 or later.
FG-IR-22-493 affects authenticated users of FortiManager and FortiAnalyzer versions below the specified remedial updates.
FG-IR-22-493 is identified as a server-side request forgery (SSRF) vulnerability.
An attacker exploiting FG-IR-22-493 can access unauthorized files and services on the FortiManager and FortiAnalyzer systems.