Lucene search

K
cveFortinetCVE-2023-45582
HistoryNov 14, 2023 - 6:15 p.m.

CVE-2023-45582

2023-11-1418:15:55
CWE-307
fortinet
web.nvd.nist.gov
36
cve-2023-45582
cwe-307
fortimail
webmail
authentication
vulnerability
brute force attack

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

20.5%

An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiMail webmail version 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 and before 6.4.8 may allow an unauthenticated attacker toΒ  perform a brute force attack on the affected endpoints via repeated login attempts.

Affected configurations

Nvd
Node
fortinetfortimailRange6.2.0–6.2.9
OR
fortinetfortimailRange6.4.0–6.4.8
OR
fortinetfortimailRange7.0.0–7.0.6
OR
fortinetfortimailRange7.2.0–7.2.4
OR
fortinetfortimailMatch7.4.0
VendorProductVersionCPE
fortinetfortimail*cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
fortinetfortimail7.4.0cpe:2.3:a:fortinet:fortimail:7.4.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiMail",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "7.4.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.8",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.9",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

20.5%

Related for CVE-2023-45582