First published: Thu Feb 08 2024(Updated: )
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiManager, FortiAnalyzer & FortiAnalyzer-BigData may allow an adom administrator to enumerate other adoms and device names via crafted HTTP or HTTPS requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.1 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.3 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.11 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.1 | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.11 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-268 is classified as an exposure of sensitive information vulnerability.
To fix FG-IR-23-268, upgrade FortiManager or FortiAnalyzer to the appropriate patched version specified in the vendor's advisory.
FG-IR-23-268 affects FortiManager and FortiAnalyzer versions prior to the specified remediation versions.
Yes, FG-IR-23-268 can allow unauthorized actors to enumerate sensitive information, leading potentially to data breaches.
FG-IR-23-268 is caused by crafted HTTP or HTTPS requests that exploit the vulnerability in the affected products.