CVE-2023-44249Authorization Bypass Through User-Controlled Key in Fortinet Fortianalyzer

Severity
6.5MEDIUMNVD
CNA4.3
EPSS
0.1%
top 64.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10

Description

An authorization bypass through user-controlled key [CWE-639] vulnerability in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 allows a remote attacker with low privileges to read sensitive information via crafted HTTP requests.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDfortinet/fortimanager7.2.07.2.4+4
NVDfortinet/fortianalyzer7.2.07.2.4+4
CVEListV5fortinet/fortimanager7.2.07.2.3+4
CVEListV5fortinet/fortianalyzer7.2.07.2.3+4

🔴Vulnerability Details

2
GHSA
GHSA-c7m9-r72h-m8v2: An authorization bypass through user-controlled key [CWE-639] vulnerability in Fortinet FortiManager version 72023-10-10
CVEList
CVE-2023-44249: An authorization bypass through user-controlled key [CWE-639] vulnerability in Fortinet FortiManager version 72023-10-10

📋Vendor Advisories

1
Fortinet
Authorization bypass via key value controlled by user2023-10-10
CVE-2023-44249 — Fortinet Fortianalyzer vulnerability | cvebase