CVE-2023-40723

An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.
CVSS

No CVSS.

References
Link Resource
https://fortiguard.com/psirt/FG-IR-23-117 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*

History

22 Jul 2025, 21:21

Type Values Removed Values Added
First Time Fortinet
Fortinet fortisiem
References () https://fortiguard.com/psirt/FG-IR-23-117 - () https://fortiguard.com/psirt/FG-IR-23-117 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*

11 Mar 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 15:15

Updated : 2025-07-22 21:21


NVD link : CVE-2023-40723

Mitre link : CVE-2023-40723


JSON object : View

Products Affected

fortinet

  • fortisiem
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor