CVE-2023-44254

An authorization bypass through user-controlled key [CWE-639] vulnerability in FortiAnalyzer version 7.4.1 and before 7.2.5 and FortiManager version 7.4.1 and before 7.2.5 may allow a remote attacker with low privileges to read sensitive data via a crafted HTTP request.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-23-204 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*

History

12 Dec 2024, 13:56

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortianalyzer-bigdata:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*
First Time Fortinet fortianalyzer Big Data

Information

Published : 2024-09-10 15:15

Updated : 2024-12-12 13:56


NVD link : CVE-2023-44254

Mitre link : CVE-2023-44254

CVE.ORG link : CVE-2023-44254


JSON object : View

Products Affected

fortinet

  • fortianalyzer
  • fortimanager
  • fortianalyzer_big_data
CWE
CWE-639

Authorization Bypass Through User-Controlled Key