Lucene search

K
cveFortinetCVE-2024-23112
HistoryMar 12, 2024 - 3:15 p.m.

CVE-2024-23112

2024-03-1215:15:49
CWE-639
fortinet
web.nvd.nist.gov
53
cve-2024-23112
authorization bypass
fortios
fortiproxy
cwe-639
ssl-vpn
nvd

CVSS3

8

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

7.8

Confidence

High

EPSS

0

Percentile

14.0%

An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.

Affected configurations

Nvd
Node
fortinetfortiproxyRange7.0.0–7.0.14
OR
fortinetfortiproxyRange7.2.0–7.2.8
OR
fortinetfortiproxyRange7.4.0–7.4.2
OR
fortinetfortiosRange6.4.7–6.4.14
OR
fortinetfortiosRange7.0.1–7.0.13
OR
fortinetfortiosRange7.2.0–7.2.6
OR
fortinetfortiosRange7.4.0–7.4.1
VendorProductVersionCPE
fortinetfortiproxy*cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
fortinetfortios*cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiOS",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.4.0",
        "lessThanOrEqual": "7.4.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.1",
        "lessThanOrEqual": "7.0.13",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.7",
        "lessThanOrEqual": "6.4.14",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiProxy",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.4.0",
        "lessThanOrEqual": "7.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.8",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.14",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

7.8

Confidence

High

EPSS

0

Percentile

14.0%

Related for CVE-2024-23112