Description
An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiVoice 7.0.0 through 7.0.1 may allow a remote authenticated attacker with at least read-only permission on system maintenance to access backup information via crafted HTTP requests
Published: 2026-04-14
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Immediate Patch
AI Analysis

Impact

An authentication-based vulnerability permits a remote attacker to retrieve confidential backup data by sending specially crafted HTTP requests. The flaw allows exposure of sensitive information without providing the attacker with additional privileges beyond those granted by standard read-only maintenance access. The vulnerability is identified as a typical information disclosure flaw, typically classified under CWE-200, which can lead to unauthorized data exposure and potential compromise of operational secrets.

Affected Systems

The affected products are Fortinet FortiNDR across multiple major releases, namely 7.0.0 through 7.6.0, and all intermediate versions, as well as FortiVoice 7.0.0 and 7.0.1. These devices run on the Fortinet platform and provide network detection and voice services, respectively. Any deployment of these products that has not yet upgraded to the specified patches is susceptible to the described issue.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate risk level. Although no EPSS score is published, the vulnerability requires authenticated access with read‑only permissions, which means the attack surface is limited to users with legitimate system maintenance roles. The lack of a listing in the CISA KEV catalog suggests there is no active exploitation noticed in the wild yet. Nonetheless, the potential impact on confidentiality warrants prompt remediation. The attacker would need to authenticate to the system, then forge HTTP requests to extract backup material, which could contain sensitive logs or configuration data.

Generated by OpenCVE AI on April 14, 2026 at 17:40 UTC.

Remediation

Vendor Solution

Upgrade to FortiVoice version 7.0.2 or above Upgrade to FortiVoice version 6.4.9 or above Upgrade to FortiNDR version 7.6.1 or above Upgrade to FortiNDR version 7.4.9 or above


OpenCVE Recommended Actions

  • Upgrade FortiVoice to version 7.0.2 or later
  • Upgrade FortiVoice to version 6.4.9 or later (for older product line)
  • Upgrade FortiNDR to version 7.6.1 or later
  • Upgrade FortiNDR to version 7.4.9 or later (for older product line)

Generated by OpenCVE AI on April 14, 2026 at 17:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Sensitive Information Exposure via Crafted HTTP Requests in FortiNDR and FortiVoice

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiVoice 7.0.0 through 7.0.1 may allow a remote authenticated attacker with at least read-only permission on system maintenance to access backup information via crafted HTTP requests
First Time appeared Fortinet
Fortinet fortindr
Fortinet fortivoice
Weaknesses CWE-200
CPEs cpe:2.3:a:fortinet:fortindr:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.4.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortindr
Fortinet fortivoice
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C'}


Subscriptions

Fortinet Fortindr Fortivoice
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-04-14T16:46:15.501Z

Reserved: 2024-01-11T16:29:07.978Z

Link: CVE-2024-23104

cve-icon Vulnrichment

Updated: 2026-04-14T16:37:12.718Z

cve-icon NVD

Status : Received

Published: 2026-04-14T16:16:28.723

Modified: 2026-04-14T16:16:28.723

Link: CVE-2024-23104

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T15:30:06Z

Weaknesses