First published: Tue Oct 10 2023(Updated: )
A client-side enforcement of server-side security [CWE-602] vulnerability in FortiManager and FortiAnalyzer may allow a remote attacker with low privileges to access a privileged web console via client side code execution.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.9 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-187 is critical due to the potential for unauthorized access to a privileged web console.
To fix FG-IR-23-187, upgrade FortiManager and FortiAnalyzer to the latest recommended versions such as 7.4.1 or 7.2.6 or any other applicable remedial version.
Affected versions of FortiManager include versions prior to 7.0.10, 7.2.4, and those in the 6.x range.
Yes, FG-IR-23-187 affects certain versions of FortiAnalyzer, specifically those below 7.2.6.
FG-IR-23-187 may allow a remote attacker to execute client-side code leading to unauthorized access.