

Rewterz Threat Advisory – Multiple Microsoft Windows Products Vulnerabilities
November 18, 2023
Rewterz Threat Advisory – CVE-2023-40363 – IBM InfoSphere Information Server Vulnerability
November 19, 2023
Rewterz Threat Advisory – Multiple Microsoft Windows Products Vulnerabilities
November 18, 2023
Rewterz Threat Advisory – CVE-2023-40363 – IBM InfoSphere Information Server Vulnerability
November 19, 2023Severity
High
Analysis Summary
CVE-2023-36641 CVSS:6.5
Fortinet FortiOS and Fortinet FortiProxy are vulnerable to a denial of service, caused by a numeric truncation error. By sending a specially crafted HTTP request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-36633 CVSS:5.4
Fortinet FortiMail could allow a remote authenticated attacker to bypass security restrictions, caused by an improper authorization. By sending a specially crafted HTTP or HTTPS request, an attacker could exploit this vulnerability to modify the titles of other users’ address book folders.
CVE-2023-42783 CVSS:7.5
Fortinet FortiWLM could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted HTTP request to the management interface containing “dot dot” sequences (/../) to read arbitrary files on the system.
CVE-2023-26205 CVSS:8.1
Fortinet FortiADC could allow a remote authenticated attacker to gain elevated privileges on the system, caused by improper access control. By using a specially crafted configuration of fabric automation CLI script, an attacker could exploit this vulnerability to obtain administrative privileges.
CVE-2023-36553 CVSS:9.8
Fortinet FortiSIEM could allow a remote attacker to execute arbitrary commands on the system, caused by an OS command injection vulnerability. By sending specially crafted API requests, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVE-2023-45585 CVSS:2.3
Fortinet FortiSIEM could allow a local authenticated attacker to obtain sensitive information, caused by insertion of sensitive information into log files. An attacker could exploit this vulnerability to obtain encrypted ElasticSearch passwords from debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage and use this information to launch further attacks against the affected system.
CVE-2023-28002 CVSS:6.4
Fortinet FortiOS and Fortinet FortiProxy could allow a local authenticated attacker to bypass security restrictions, caused by improper validation of integrity check values. An attacker could exploit this vulnerability to boot a malicious image on the device and bypass the filesystem integrity check in place.
CVE-2023-45582 CVSS:5.6
Fortinet FortiMail is vulnerable to a brute force attack, caused by improper restriction of excessive authentication attempts. By using brute force techniques, a remote attacker could exploit this vulnerability to gain access to the system.
CVE-2023-33304 CVSS:4.4
Fortinet FortiClient for Windows could allow a local authenticated attacker to bypass security restrictions, caused by use of hard-coded credentials in vcm2.exe. An attacker could exploit this vulnerability to bypass system protections.
CVE-2023-41676 CVSS:4.3
Fortinet FortiSIEM could allow a remote authenticated attacker to obtain sensitive information. By searching through the logs, a remote attacker could exploit this vulnerability to obtain the windows agent password.
Impact
- Denial of Service
- Security Bypass
- Information Theft
- Privileges Escalation
- Gain Access
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2023-36641
- CVE-2023-36633
- CVE-2023-42783
- CVE-2023-26205
- CVE-2023-36553
- CVE-2023-45585
- CVE-2023-28002
- CVE-2023-45582
- CVE-2023-33304
- CVE-2023-41676
Affected Vendors
Fortinet
Affected Products
- Fortinet FortiOS 6.2.1
- Fortinet FortiOS 6.0.0
- Fortinet FortiOS 6.2.0
- Fortinet FortiOS 6.4.0
- Fortinet FortiOS 6.2.2
- Fortinet FortiOS 6.2.3
- Fortinet FortiOS 6.2.9
- Fortinet FortiOS 6.4.5
- Fortinet FortiOS 6.2.8
- Fortinet FortiOS 7.0.1
- Fortinet FortiOS 7.0.0
- Fortinet FortiOS 7.2.1
- Fortinet FortiOS 7.0.7
- Fortinet FortiOS 7.0.3
- Fortinet FortiOS 6.2.10
- Fortinet FortiOS 7.0.5
- Fortinet FortiOS 7.2.0
- Fortinet FortiOS 6.4.9
- Fortinet FortiOS 7.0.4
- Fortinet FortiProxy 2.0.0
- Fortinet FortiProxy 1.2.9
- Fortinet FortiProxy 7.0.0
- Fortinet FortiProxy 1.2.0
- Fortinet FortiProxy 1.2.11
- Fortinet FortiProxy 2.0.3
- Fortinet FortiProxy 7.0.6
- Fortinet FortiProxy 2.0.10
- Fortinet FortiProxy 7.0.2
- Fortinet FortiProxy 7.0.3
- Fortinet FortiProxy 7.0.4
- Fortinet FortiProxy 7.0.1
- Fortinet FortiProxy 2.0.7
- Fortinet FortiProxy 2.0.6
- Fortinet FortiMail 7.2.2
- Fortinet FortiMail 7.2.1
- Fortinet FortiMail 6.2.2
- Fortinet FortiMail 6.2.6
- Fortinet FortiWLM 8.6.2
- Fortinet FortiWLM 8.5.2
- Fortinet FortiWLM 8.4.2
- Fortinet FortiWLM 8.3.3
- Fortinet FortiADC 6.1.5
- Fortinet FortiADC 6.2.1
- Fortinet FortiSIEM 5.2.1
- Fortinet FortiSIEM 5.2.5
- Fortinet FortiSIEM 5.2.6
- Fortinet FortiSIEM 6.7.0
- Fortinet FortiSIEM 6.7.5
- Fortinet FortiSIEM 7.0.0
- Fortinet FortiClient for Windows 7.2.0
- Fortinet FortiClient for Windows 7.0.0
Remediation
Refer to FortiGuard Advisory for patch, upgrade or suggested workaround information.