CVE-2023-23776Sensitive Information Exposure in Fortinet Fortianalyzer

Severity
3.1LOWNVD
CNA4.6
EPSS
0.1%
top 67.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 7

Description

An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4 and 6.4.0 through 6.4.10 may allow a remote authenticated attacker to read the client machine password in plain text in a heartbeat response when a log-fetch request is made from the FortiAnalyzer

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 1.6 | Impact: 1.4

Affected Packages2 packages

NVDfortinet/fortianalyzer6.4.06.4.11+2
CVEListV5fortinet/fortianalyzer7.2.07.2.1+2

🔴Vulnerability Details

2
CVEList
CVE-2023-23776: An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 72023-03-07
GHSA
GHSA-jf2m-25h5-xp3j: An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 72023-03-07

📋Vendor Advisories

1
Fortinet
Log-fetch client request password is shown in clear text in the heartbeat response2023-03-07