First published: Tue Sep 10 2024(Updated: )
An authorization bypass through user-controlled key [CWE-639] vulnerability in FortiAnalyzer & FortiManager may allow a remote attacker with low privileges to read sensitive data via a crafted HTTP request.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | ||
Fortinet FortiManager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-204 is considered high due to its potential to allow unauthorized access to sensitive data.
To fix FG-IR-23-204, apply the latest security patches provided by Fortinet for both FortiAnalyzer and FortiManager.
FG-IR-23-204 facilitates an authorization bypass, allowing low-privileged attackers to read sensitive data.
FG-IR-23-204 affects FortiAnalyzer and FortiManager products from Fortinet.
The potential impact of FG-IR-23-204 is the exposure of sensitive information to unauthorized users.