Home

Description

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).

PUBLISHED Reserved 2024-09-27 | Published 2025-12-09 | Updated 2025-12-10 | Assigner fortinet




MEDIUM: 6.3CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C

Problem types

Escalation of privilege

Product status

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

Default status
unaffected

1.4.0 (semver)
affected

Default status
unaffected

1.4.0 (semver)
affected

1.3.0 (semver)
affected

1.2.0
affected

1.1.0 (semver)
affected

1.0.0 (semver)
affected

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.4 (semver)
affected

Default status
unaffected

24.1.10
affected

References

fortiguard.fortinet.com/psirt/FG-IR-24-268

cve.org (CVE-2024-47570)

nvd.nist.gov (CVE-2024-47570)

Download JSON