CVE-2023-40720

Severity
7.1HIGH
EPSS
0.0%
top 87.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 14

Description

An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:LExploitability: 2.8 | Impact: 4.2

Affected Packages2 packages

CVEListV5fortinet/fortivoice7.0.07.0.1+2
NVDfortinet/fortivoice6.0.06.0.12+3

🔴Vulnerability Details

2
CVEList
CVE-2023-40720: An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 72024-05-14
GHSA
GHSA-wr9w-6wcp-7m3p: An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 72024-05-14

📋Vendor Advisories

1
Fortinet
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 throug...2024-05-14
CVE-2023-40720 (HIGH CVSS 7.1) | An authorization bypass through use | cvebase.io