Lucene search

K
cveFortinetCVE-2020-15933
HistoryJan 05, 2022 - 12:15 p.m.

CVE-2020-15933

2022-01-0512:15:07
CWE-200
fortinet
web.nvd.nist.gov
31
cve-2020-15933
fortinet
fortimail
security vulnerability
information disclosure
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

36.4%

A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.

Affected configurations

Nvd
Node
fortinetfortimailRange6.0.9
OR
fortinetfortimailMatch6.2.0
OR
fortinetfortimailMatch6.2.1
OR
fortinetfortimailMatch6.2.2
OR
fortinetfortimailMatch6.2.3
OR
fortinetfortimailMatch6.2.4
OR
fortinetfortimailMatch6.4.0
OR
fortinetfortimailMatch6.4.1
VendorProductVersionCPE
fortinetfortimail*cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
fortinetfortimail6.2.0cpe:2.3:a:fortinet:fortimail:6.2.0:*:*:*:*:*:*:*
fortinetfortimail6.2.1cpe:2.3:a:fortinet:fortimail:6.2.1:*:*:*:*:*:*:*
fortinetfortimail6.2.2cpe:2.3:a:fortinet:fortimail:6.2.2:*:*:*:*:*:*:*
fortinetfortimail6.2.3cpe:2.3:a:fortinet:fortimail:6.2.3:*:*:*:*:*:*:*
fortinetfortimail6.2.4cpe:2.3:a:fortinet:fortimail:6.2.4:*:*:*:*:*:*:*
fortinetfortimail6.4.0cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*
fortinetfortimail6.4.1cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Fortinet FortiMail",
    "vendor": "Fortinet",
    "versions": [
      {
        "status": "affected",
        "version": "FortiMail 6.4.1, 6.4.0, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.4.12, 5.4.11, 5.4.10, 5.4.9, 5.4.8, 5.4.7, 5.4.6, 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0, 5.3.13, 5.3.12, 5.3.10, 5.3.9, 5.3.8, 5.3.7, 5.3.6, 5.3.5, 5.3.4, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.10, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.11, 5.0.10, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.1, 5.0.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3.0, 4.2.4, 4.2.3, 4.2.2, 4.2.1, 4.2.0, 4.1.3, 4.1.2, 4.1.1, 4.1.0, 4.0.5, 4.0.4, 4.0.3, 4.0.1"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5

Confidence

High

EPSS

0.001

Percentile

36.4%

Related for CVE-2020-15933