An improper access control in Fortinet FortiExtender 4.1.1 - 4.1.9, 4.2.0 - 4.2.6, 5.3.2, 7.0.0 - 7.0.4, 7.2.0 - 7.2.4 and 7.4.0 - 7.4.2 allows an attacker to create users with elevated privileges via a crafted HTTP request.
Fixes

Solution

Please upgrade to FortiExtender version 7.4.3 or above Please upgrade to FortiExtender version 7.2.5 or above Please upgrade to FortiExtender version 7.0.5 or above


Workaround

No workaround given by the vendor.

References
History

Mon, 09 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet fortiextender Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:*
Vendors & Products Fortinet fortiextender Firmware

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-08-01T23:06:25.354Z

Reserved: 2024-01-19T08:23:28.612Z

Link: CVE-2024-23663

cve-icon Vulnrichment

Updated: 2024-07-09T17:44:47.175Z

cve-icon NVD

Status : Modified

Published: 2024-07-09T16:15:04.593

Modified: 2024-11-21T08:58:07.203

Link: CVE-2024-23663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.