First published: Tue Mar 12 2024(Updated: )
An improper access control vulnerability [`CWE-284]` in FortiWLM MEA for FortiManager may allow an unauthenticated remote attacker to execute arbitrary code or commands via specifically crafted requests. Note that FortiWLM MEA is not installed by default on FortiManager and can be disabled as a workaround.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | ||
Fortinet FortiManager | ||
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.10 | |
Fortinet FortiManager | >=6.4.0<=6.4.13 | |
Fortinet FortiManager | >=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-103 is high due to the potential for unauthenticated remote code execution.
To fix FG-IR-23-103, upgrade your FortiManager to at least version 7.4.1 or the appropriate remedial version for your current release.
FG-IR-23-103 affects various versions of FortiManager, specifically prior to versions 7.4.1, 7.2.4, 7.0.11, and 6.4.14.
FG-IR-23-103 is classified as an improper access control vulnerability, allowing remote attackers to execute arbitrary code.
Yes, FG-IR-23-103 can be exploited by unauthenticated remote attackers through specially crafted requests.