Home

Description

An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.

PUBLISHED Reserved 2023-08-21 | Published 2025-03-11 | Updated 2025-03-12 | Assigner fortinet




HIGH: 7.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

6.7.0 (semver)
affected

6.6.0 (semver)
affected

6.5.0 (semver)
affected

6.4.0 (semver)
affected

6.3.0 (semver)
affected

6.2.0 (semver)
affected

6.1.0 (semver)
affected

5.4.0
affected

5.3.0 (semver)
affected

5.2.5 (semver)
affected

5.2.1 (semver)
affected

5.1.0 (semver)
affected

References

fortiguard.com/psirt/FG-IR-23-117

cve.org (CVE-2023-40723)

nvd.nist.gov (CVE-2023-40723)

Download JSON