- Description
- A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData at least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiManager version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14 allows attacker to improper access control via crafted requests.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- psirt@fortinet.com
- CWE-602
- nvd@nist.gov
- NVD-CWE-Other
- Hype score
- Not currently trending
In 2024, Fortinet deployed several patches for CVE-2023-42791 and CVE-2024-23666, discovered by @Aeinot_, Paul Barbé and @loadlow. These vulnerabilities allow, from read-only access to a FortiManager, to execute code as root and thus take control of all managed FortiGates.… ht
@Synacktiv
18 Feb 2025
3221 Impressions
13 Retweets
46 Likes
14 Bookmarks
0 Replies
1 Quote
برای برخی محصولات Fortinet شامل : FortiOS و FortiAnalyzer و FortiClient چندین آسیب پذیری Critical با کدهای شناسایی CVE-2024-23666 و CVE-2024-36513 و CVE-2023-50176 منتشر شده است. این آسیب پذیری ها از نوع Hijack session و privilege escalation می باشند. https://t.co/Poz3aKYxT1 http
@AmirHossein_sec
15 Nov 2024
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-23666 A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData at least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiMa... https://t.co/sOZv1IvMwn
@VulmonFeeds
13 Nov 2024
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34F71CF0-4C81-4261-BDA8-30287969D137",
"versionEndExcluding": "6.4.15",
"versionStartIncluding": "6.4.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BFAF2532-DF9C-458E-B69B-59C29507F775",
"versionEndExcluding": "7.0.13",
"versionStartIncluding": "7.0.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6FCEF6EE-A923-4DCE-A225-C6D1FB0123E8",
"versionEndExcluding": "7.2.6",
"versionStartIncluding": "7.2.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AF309EFD-1770-44AF-B192-3D9816F792CB",
"versionEndExcluding": "7.4.3",
"versionStartIncluding": "7.4.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "50659BC2-500F-4D79-8800-E0B7E9E9E203",
"versionEndExcluding": "7.2.7",
"versionStartIncluding": "6.2.1"
},
{
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_big_data:7.4.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "80598594-A45A-4E69-B968-1DD3DBD30FF9"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D2AD66B0-9C99-4F83-80AA-B54E6354ADFD",
"versionEndExcluding": "6.4.15",
"versionStartIncluding": "6.4.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "37456E27-0EE2-4AF8-B92F-A5284FEC0409",
"versionEndExcluding": "7.0.13",
"versionStartIncluding": "7.0.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "605795FE-4D3E-48D4-B2E6-AED4C79B405F",
"versionEndExcluding": "7.2.6",
"versionStartIncluding": "7.2.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E4490512-36ED-4212-9D34-D74739A56E84",
"versionEndExcluding": "7.4.3",
"versionStartIncluding": "7.4.0"
}
],
"operator": "OR"
}
]
}
]