First published: Tue Mar 12 2024(Updated: )
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS and FortiProxy SSLVPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.6 | |
Fortinet FortiOS IPS Engine | >=7.0.1<=7.0.13 | |
Fortinet FortiOS IPS Engine | >=6.4.7<=6.4.14 | |
Fortinet FortiProxy | >=7.4.0<=7.4.2 | |
Fortinet FortiProxy | >=7.2.0<=7.2.8 | |
Fortinet FortiProxy | >=7.0.0<=7.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
FG-IR-24-013 is classified as a medium severity vulnerability.
To fix FG-IR-24-013, upgrade your FortiOS or FortiProxy to the appropriate versions specified in the advisory.
FortiOS versions 7.4.0 to 7.4.1, 7.2.0 to 7.2.6, 7.0.1 to 7.0.13, and 6.4.7 to 6.4.14 are affected by FG-IR-24-013.
FortiProxy versions 7.4.0 to 7.4.2, 7.2.0 to 7.2.8, and 7.0.0 to 7.0.14 are affected by FG-IR-24-013.
FG-IR-24-013 can potentially be exploited by an authenticated attacker through URL manipulation.