CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:F/RC:C
AI Score
Confidence
High
EPSS
Percentile
14.0%
An improper authorization vulnerability [CWE-285] in Fortinet FortiADC version 7.4.0 and before 7.2.2 may allow a low privileged user to read or backup the full system configuration via HTTP or HTTPS requests.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortiadc | * | cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:* |
fortinet | fortiadc | 7.1.0 | cpe:2.3:a:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:* |
fortinet | fortiadc | 7.1.1 | cpe:2.3:a:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:* |
fortinet | fortiadc | 7.1.2 | cpe:2.3:a:fortinet:fortiadc:7.1.2:*:*:*:*:*:*:* |
fortinet | fortiadc | 7.2.0 | cpe:2.3:a:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:* |
fortinet | fortiadc | 7.4.0 | cpe:2.3:a:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:* |
[
{
"vendor": "Fortinet",
"product": "FortiADC",
"defaultStatus": "unaffected",
"versions": [
{
"version": "7.4.0",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.2.0",
"lessThanOrEqual": "7.2.2",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.1.0",
"lessThanOrEqual": "7.1.4",
"status": "affected"
},
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.5",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.2.0",
"lessThanOrEqual": "6.2.6",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.1.0",
"lessThanOrEqual": "6.1.6",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.0.0",
"lessThanOrEqual": "6.0.4",
"status": "affected"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:F/RC:C
AI Score
Confidence
High
EPSS
Percentile
14.0%