Description
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiVoice version 7.0.2 or above Please upgrade to FortiVoice version 6.4.9 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-45274 | An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-282 |
|
History
No history.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T18:38:51.211Z
Reserved: 2023-08-21T09:03:44.316Z
Link: CVE-2023-40720
Updated: 2024-05-14T19:29:30.379Z
Status : Modified
Published: 2024-05-14T17:15:19.067
Modified: 2024-11-21T08:20:01.767
Link: CVE-2023-40720
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD