No analysis available yet.
Vendor Solution
Please upgrade to FortiSASE version 23.4.a or above Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.7 or above Please upgrade to FortiOS version 7.0.13 or above Please upgrade to FortiOS version 6.4.15 or above Please upgrade to FortiOS version 6.2.16 or above Please upgrade to FortiProxy version 7.4.2 or above Please upgrade to FortiProxy version 7.2.8 or above Please upgrade to FortiProxy version 7.0.14 or above
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-46169 | A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows attacker to execute unauthorized code or commands via targeted social engineering attack |
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-493 |
|
Thu, 12 Dec 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortios Fortinet fortiproxy |
|
| CPEs | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortios Fortinet fortiproxy |
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T19:01:35.404Z
Reserved: 2023-08-30T13:42:39.547Z
Link: CVE-2023-41677
Updated: 2024-08-02T19:01:35.404Z
Status : Analyzed
Published: 2024-04-09T15:15:27.400
Modified: 2024-12-12T19:22:04.470
Link: CVE-2023-41677
No data.
OpenCVE Enrichment
No data.
EUVD