First published: Wed Sep 13 2023(Updated: )
An improper privilege management vulnerability [CWE-269] in FortiManager and FortiAnalyzer API may allow a remote and authenticated API admin user to access some system settings such as the mail server settings through the API via a stolen GUI session ID.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.2.0<=7.2.2 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.7 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.11 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiAnalyzer | >=6.0 | |
Fortinet FortiManager | >=7.2.0<=7.2.2 | |
Fortinet FortiManager | >=7.0.0<=7.0.7 | |
Fortinet FortiManager | >=6.4.0<=6.4.11 | |
Fortinet FortiManager | >=6.2 | |
Fortinet FortiManager | >=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-22-522 is high due to the potential for unauthorized access to sensitive system settings.
To fix FG-IR-22-522, update FortiManager and FortiAnalyzer to versions 7.2.3 or later, 7.0.8 or later, or 6.4.12 or later, depending on your version.
FG-IR-22-522 affects FortiManager and FortiAnalyzer versions below the specified remedial versions.
FG-IR-22-522 is an improper privilege management vulnerability that allows API admin users to access certain system settings.
Yes, FG-IR-22-522 can be exploited remotely by an authenticated user, allowing unauthorized system access.