Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-20637 | An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation. |
Solution
Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.7 or above Please upgrade to FortiOS version 7.0.14 or above Please upgrade to FortiOS version 6.4.15 or above Please upgrade to FortiProxy version 7.4.3 or above Please upgrade to FortiProxy version 7.2.9 or above Please upgrade to FortiProxy version 7.0.15 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-24-013 |
|
No history.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-01T22:51:11.269Z
Reserved: 2024-01-11T16:29:07.979Z
Link: CVE-2024-23112
Updated: 2024-08-01T22:51:11.269Z
Status : Modified
Published: 2024-03-12T15:15:49.090
Modified: 2024-11-21T08:56:57.390
Link: CVE-2024-23112
No data.
OpenCVE Enrichment
No data.
EUVD