Lucene search

K
vulnrichmentFortinetVULNRICHMENT:CVE-2023-42782
HistoryOct 10, 2023 - 4:50 p.m.

CVE-2023-42782

2023-10-1016:50:26
CWE-345
fortinet
github.com
vulnerability
data authenticity
fortianalyzer

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:C

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

A insufficient verification of data authenticity vulnerability [CWE-345] in FortiAnalyzer version 7.4.0 and below 7.2.3 allows a remote unauthenticated attacker to send messages to the syslog server of FortiAnalyzer via the knoweldge of an authorized device serial number.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortianalyzer",
    "versions": [
      {
        "status": "affected",
        "version": "7.4.0"
      },
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.2.3"
      },
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.0.9"
      },
      {
        "status": "affected",
        "version": "6.4.0",
        "versionType": "custom",
        "lessThanOrEqual": "6.4.13"
      },
      {
        "status": "affected",
        "version": "6.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "6.2.12"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortianalyzer-bigdata:*:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortianalyzer-bigdata",
    "versions": [
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.2.5"
      },
      {
        "status": "affected",
        "version": "7.0"
      },
      {
        "status": "affected",
        "version": "6.4"
      },
      {
        "status": "affected",
        "version": "6.2"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortimanager",
    "versions": [
      {
        "status": "affected",
        "version": "7.4.0"
      },
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.2.3"
      },
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.0.9"
      },
      {
        "status": "affected",
        "version": "6.4"
      },
      {
        "status": "affected",
        "version": "6.2"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:C

AI Score

7

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-42782