

GitHub Developers Targeted by New GoIssue Phishing Tool’s Bulk Email Campaigns
November 14, 2024
ICS: Rockwell Automation FactoryTalk View ME Vulnerability
November 14, 2024
GitHub Developers Targeted by New GoIssue Phishing Tool’s Bulk Email Campaigns
November 14, 2024
ICS: Rockwell Automation FactoryTalk View ME Vulnerability
November 14, 2024Severity
Medium
Analysis Summary
CVE-2023-44255 CVSS: 4.1
An exposure of sensitive information to an unauthorized actor [CWE-200] in Fortinet FortiManager before 7.4.2, FortiAnalyzer before 7.4.2 and FortiAnalyzer-BigData before 7.2.5 may allow a privileged attacker with administrative read permissions to read event logs of another adom via crafted HTTP or HTTPs requests.
CVE-2023-47543 CVSS: 5.4
An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to interact with ressources of other organizations via HTTP or HTTPS requests.
CVE-2024-23666 CVSS: 7.5
A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData at least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiManager version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14 allows attacker to improper access control via crafted requests.
CVE-2024-26011 CVSS: 5.3
A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.0 through 7.0.3, FortiPortal version 6.0.0 through 6.0.14, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted packets.
CVE-2024-31496 CVSS: 6.7
A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData 7.4.0 and before 7.2.7 allows a privileged attacker to execute unauthorized code or commands via crafted CLI requests.
CVE-2024-32116 CVSS: 5.1
Multiple relative path traversal vulnerabilities [CWE-23] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData version 7.4.0 and before 7.2.7 allows a privileged attacker to delete files from the underlying filesystem via crafted CLI requests.
CVE-2024-32117 CVSS: 4.9
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiManager version 7.4.0 through 7.4.2 and below 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and below 7.2.5 & FortiAnalyzer-BigData version 7.4.0 and below 7.2.7 allows a privileged attacker to read arbitrary files from the underlying system via crafted HTTP or HTTPs requests.
CVE-2024-32118 CVSS: 6.7
Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and Fortinet FortiAnalyzer-BigData before 7.4.0 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.
CVE-2024-33505 CVSS: 5.6
A heap-based buffer overflow in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to escalation of privilege via specially crafted http requests
CVE-2024-33510 CVSS: 4.3
An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.16 and below; FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below; FortiSASE version 24.2.b SSL-VPN web user interface may allow a remote unauthenticated attacker to perform phishing attempts via crafted requests.
CVE-2024-35274 CVSS: 2.3
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiAnalyzer versions below 7.4.2, Fortinet FortiManager versions below 7.4.2 and Fortinet FortiAnalyzer-BigData version 7.4.0 and below 7.2.7 allows a privileged attacker with read write administrative privileges to create non-arbitrary files on a chosen directory via crafted CLI requests.
CVE-2024-36509 CVSS: 4.2
An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiWeb version 7.6.0, version 7.4.3 and below, version 7.2.10 and below, version 7.0.10 and below, version 6.3.23 and below may allow an authenticated attacker to access the encrypted passwords of other administrators via the "Log Access Event" logs page.
CVE-2023-50176 CVSS: 7.5
A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.13 allows attacker to execute unauthorized code or commands via phishing SAML authentication link.
Impact
- Information Disclosure
- Security Bypass
- Code Execution
- Data Manipulation
- Privilege Escalation
- Gain Access
Indicators of Compromise
CVE
- CVE-2023-44255
- CVE-2023-47543
- CVE-2024-23666
- CVE-2024-26011
- CVE-2024-31496
- CVE-2024-32116
- CVE-2024-32117
- CVE-2024-32118
- CVE-2024-33505
- CVE-2024-33510
- CVE-2024-35274
- CVE-2024-36509
- CVE-2023-50176
Affected Vendors
Affected Products
- Fortinet FortiOS 6.2
- Fortinet FortiOS 6.0
- Fortinet FortiOS 6.4
- Fortinet FortiManager 6.2
- Fortinet FortiAnalyzer-BigData 6.4
- Fortinet FortiAnalyzer-BigData 6.2
- Fortinet FortiOS 7.4.3
- Fortinet FortiAnalyzer 7.4.2
- Fortinet FortiAnalyzer 7.2.5
- Fortinet FortiAnalyzer 6.4.14
- Fortinet FortiAnalyzer 6.2
- Fortinet FortiAnalyzer Cloud 7.4.2
- Fortinet FortiAnalyzer Cloud 7.2.6
- Fortinet FortiAnalyzer Cloud 7.0
- Fortinet FortiAnalyzer Cloud 6.4
- Fortinet FortiAnalyzer-BigData 7.4.0
- Fortinet FortiAnalyzer-BigData 7.2.7
- Fortinet FortiManager 7.4.2
- Fortinet FortiManager 7.2.5
- Fortinet FortiManager 7.0.11
- Fortinet FortiManager 6.4.14
- Fortinet FortiPortal 6.0.14
- Fortinet FortiPortal 5.3
- Fortinet FortiPortal 7.2
- Fortinet FortiPortal 7.0.3
- Fortinet FortiOS 7.2.8
- Fortinet FortiOS 7.0.14
- Foritnet FortiPAM 1.2
- Foritnet FortiPAM 1.1
- Foritnet FortiPAM 1.0
- Foritnet FortiProxy 7.4.3
- Foritnet FortiProxy 7.2.9
- Foritnet FortiProxy 7.0.16
- Foritnet FortiProxy 2.0
- Foritnet FortiProxy 1.2
- Foritnet FortiProxy 1.1
- Foritnet FortiProxy 1.0
- Foritnet FortiSwitchManager 7.2.3
- Foritnet FortiSwitchManager 7.0.3
- Foritnet FortiWeb 7.6.0
- Foritnet FortiWeb 7.4.3
- Foritnet FortiWeb 7.2
- Foritnet FortiWeb 7.0
- Foritnet FortiWeb 6.3
Remediation
Refer to Fortinet Security Advisory for patch, upgrade, or suggested workaround information.