First published: Tue Nov 12 2024(Updated: )
A client-side enforcement of server-side security vulnerability [CWE-602] in FortiAnalyzer may allow an authenticated attacker with at least read-only permission to execute sensitive operations via crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.12 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.14 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.6 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0.0<=7.0.12 | |
Fortinet FortiManager | >=6.4.0<=6.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability FG-IR-23-396 is classified as a client-side enforcement of server-side security issue that allows authenticated attackers to execute sensitive operations.
To fix FG-IR-23-396, upgrade your FortiAnalyzer or FortiManager to the specified remedial versions: FortiAnalyzer to 7.4.3, 7.2.6, 7.0.13, or 6.4.15 and FortiManager to 7.4.3, 7.2.6, 7.0.13, or 6.4.15.
The affected versions of FortiAnalyzer are 7.4.0 to 7.4.2, 7.2.0 to 7.2.5, 7.0.0 to 7.0.12, and 6.4.0 to 6.4.14, while FortiManager versions are 7.4.0 to 7.4.2, 7.2.0 to 7.2.5, 7.0.0 to 7.0.12, and 6.4.0 to 6.4.14.
An authenticated attacker with at least read-only permission can exploit the FG-IR-23-396 vulnerability.
FG-IR-23-396 is a client-side enforcement of server-side security vulnerability as classified by CWE-602.