An improper access control in Fortinet FortiExtender 4.1.1 - 4.1.9, 4.2.0 - 4.2.6, 5.3.2, 7.0.0 - 7.0.4, 7.2.0 - 7.2.4 and 7.4.0 - 7.4.2 allows an attacker to create users with elevated privileges via a crafted HTTP request.
References
History

Mon, 09 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet fortiextender Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:*
Vendors & Products Fortinet fortiextender Firmware

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2024-07-09T15:33:31.512Z

Updated: 2024-08-01T23:06:25.354Z

Reserved: 2024-01-19T08:23:28.612Z

Link: CVE-2024-23663

cve-icon Vulnrichment

Updated: 2024-07-09T17:44:47.175Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-09T16:15:04.593

Modified: 2024-09-09T16:05:49.647

Link: CVE-2024-23663

cve-icon Redhat

No data.