An improper access control in Fortinet FortiExtender 4.1.1 - 4.1.9, 4.2.0 - 4.2.6, 5.3.2, 7.0.0 - 7.0.4, 7.2.0 - 7.2.4 and 7.4.0 - 7.4.2 allows an attacker to create users with elevated privileges via a crafted HTTP request.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-459 |
History
Mon, 09 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet fortiextender Firmware
|
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet fortiextender Firmware
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-07-09T15:33:31.512Z
Updated: 2024-08-01T23:06:25.354Z
Reserved: 2024-01-19T08:23:28.612Z
Link: CVE-2024-23663
Vulnrichment
Updated: 2024-07-09T17:44:47.175Z
NVD
Status : Modified
Published: 2024-07-09T16:15:04.593
Modified: 2024-11-21T08:58:07.203
Link: CVE-2024-23663
Redhat
No data.