First published: Tue Oct 10 2023(Updated: )
A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer, FortiAnalyzer-BigData and FortiManager with FortiAnalyzer features may allow a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | ||
Fortinet FortiAnalyzer | ||
Fortinet FortiManager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-221 is categorized as insufficient verification of data authenticity, allowing potential remote attacks.
To fix FG-IR-23-221, update your FortiAnalyzer, FortiAnalyzer-BigData, or FortiManager to the latest patched version provided by Fortinet.
FG-IR-23-221 affects FortiAnalyzer, FortiAnalyzer-BigData, and FortiManager with specific FortiAnalyzer features.
Yes, FG-IR-23-221 can be exploited remotely by unauthenticated attackers to send messages to the syslog server.
The FG-IR-23-221 vulnerability involves insufficient verification of data authenticity, posing a risk to message integrity.