CVE-2024-23112Authorization Bypass Through User-Controlled Key in Fortinet Fortios

Severity
4.3MEDIUMNVD
CNA8.0
EPSS
0.1%
top 76.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 12

Description

An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

CVEListV5fortinet/fortios7.4.07.4.1+3
NVDfortinet/fortios6.4.76.4.14+3
CVEListV5fortinet/fortiproxy7.4.07.4.2+2
NVDfortinet/fortiproxy7.0.07.0.14+2

🔴Vulnerability Details

2
CVEList
CVE-2024-23112: An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 72024-03-12
GHSA
GHSA-hhmq-2c6m-mgv4: An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 72024-03-12

📋Vendor Advisories

1
Fortinet
Authorization bypass in SSLVPN bookmarks2024-03-12
CVE-2024-23112 — Fortinet Fortios vulnerability | cvebase