Lucene search

K
nvd[email protected]NVD:CVE-2023-36638
HistorySep 13, 2023 - 1:15 p.m.

CVE-2023-36638

2023-09-1313:15:09
CWE-284
web.nvd.nist.gov
cve-2023-36638
fortimanager
fortianalyzer
api
cwe-269
vulnerability

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

An improper privilege management vulnerability [CWE-269] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions API may allow a remote and authenticated API admin user to access some system settings such as the mail server settings through the API via a stolen GUI session ID.

Affected configurations

NVD
Node
fortinetfortianalyzerRange6.0.06.4.12
OR
fortinetfortianalyzerRange7.0.07.0.8
OR
fortinetfortianalyzerRange7.2.07.2.3
OR
fortinetfortimanagerRange6.4.06.4.12
OR
fortinetfortimanagerRange7.0.07.0.8
OR
fortinetfortimanagerRange7.2.07.2.3

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

Related for NVD:CVE-2023-36638