First published: Tue Oct 10 2023(Updated: )
An authorization bypass through user-controlled key [CWE-639] vulnerability in FortiManager & FortiAnalyzer may allow a remote attacker with low privileges to read sensitive information via crafted HTTP requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.9 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
FG-IR-23-201 is considered a serious authorization bypass vulnerability allowing low-privileged attackers to access sensitive information.
Fix FG-IR-23-201 by updating FortiManager and FortiAnalyzer to the latest remedied versions as specified in the advisory.
FG-IR-23-201 affects various versions of FortiManager and FortiAnalyzer, specifically prior to the remedied versions mentioned in the advisory.
Yes, FG-IR-23-201 allows a remote attacker to exploit the vulnerability through crafted HTTP requests.
FG-IR-23-201 is classified as an authorization bypass vulnerability identified by CWE-639.