An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-282 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 May 2024, 16:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-282 - Vendor Advisory | |
CPE | cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
First Time |
Fortinet
Fortinet fortivoice |
14 May 2024, 19:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 17:15
Updated : 2024-05-23 16:38
NVD link : CVE-2023-40720
Mitre link : CVE-2023-40720
JSON object : View
Products Affected
fortinet
- fortivoice
CWE
CWE-639
Authorization Bypass Through User-Controlled Key