Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-20637 | An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation. |
Solution
Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.7 or above Please upgrade to FortiOS version 7.0.14 or above Please upgrade to FortiOS version 6.4.15 or above Please upgrade to FortiProxy version 7.4.3 or above Please upgrade to FortiProxy version 7.2.9 or above Please upgrade to FortiProxy version 7.0.15 or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-24-013 |
![]() ![]() ![]() |
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-01T22:51:11.269Z
Reserved: 2024-01-11T16:29:07.979Z
Link: CVE-2024-23112

Updated: 2024-08-01T22:51:11.269Z

Status : Modified
Published: 2024-03-12T15:15:49.090
Modified: 2024-11-21T08:56:57.390
Link: CVE-2024-23112

No data.

No data.