An improper access control in Fortinet FortiExtender 4.1.1 - 4.1.9, 4.2.0 - 4.2.6, 5.3.2, 7.0.0 - 7.0.4, 7.2.0 - 7.2.4 and 7.4.0 - 7.4.2 allows an attacker to create users with elevated privileges via a crafted HTTP request.
Metrics
Affected Vendors & Products
Fixes
Solution
Please upgrade to FortiExtender version 7.4.3 or above Please upgrade to FortiExtender version 7.2.5 or above Please upgrade to FortiExtender version 7.0.5 or above
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-459 |
![]() ![]() |
History
Mon, 09 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet fortiextender Firmware
|
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet fortiextender Firmware
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-01T23:06:25.354Z
Reserved: 2024-01-19T08:23:28.612Z
Link: CVE-2024-23663

Updated: 2024-07-09T17:44:47.175Z

Status : Modified
Published: 2024-07-09T16:15:04.593
Modified: 2024-11-21T08:58:07.203
Link: CVE-2024-23663

No data.

No data.