First published: Tue Nov 12 2024(Updated: )
An Exposure of personal information to an unauthorized actor [CWE-359] in FortiManager, FortiAnalyzer & FortiAnalyzer-BigData may allow a privileged attacker with administrative read permissions to read event logs of another adom via crafted HTTP or HTTPs requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-267 is classified as high due to the exposure of personal information to unauthorized actors.
To mitigate FG-IR-23-267, upgrade FortiManager and FortiAnalyzer to version 7.4.3 or apply the necessary updates for affected versions.
FG-IR-23-267 affects FortiAnalyzer, FortiAnalyzer-BigData, and FortiManager across several versions.
FG-IR-23-267 is an exposure of personal information to an unauthorized actor, categorized under CWE-359.
Yes, a privileged attacker with administrative read permissions can exploit FG-IR-23-267 to read event logs of another ADOM.