Lucene search

K
vulnrichmentFortinetVULNRICHMENT:CVE-2024-23112
HistoryMar 12, 2024 - 3:09 p.m.

CVE-2024-23112

2024-03-1215:09:17
CWE-639
fortinet
github.com
3
cve-2024-23112
cwe-639
fortios
fortiproxy
ssl-vpn
user-controlled key
url manipulation

CVSS3

8

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortios",
    "versions": [
      {
        "status": "affected",
        "version": "7.4.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.4.1"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortios",
    "versions": [
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.2.6"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortios",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.1",
        "versionType": "semver",
        "lessThanOrEqual": "7.0.13"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:o:fortinet:fortios:6.4.7:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortios",
    "versions": [
      {
        "status": "affected",
        "version": "6.4.7",
        "versionType": "semver",
        "lessThanOrEqual": "6.4.14"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiproxy",
    "versions": [
      {
        "status": "affected",
        "version": "7.4.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.4.2"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiproxy",
    "versions": [
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.2.8"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortiproxy",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.0.14"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

8

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C

AI Score

7

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-23112