CVE-2024-36511

An improperly implemented security check for standard vulnerability [CWE-358] in FortiADC Web Application Firewall (WAF) 7.4.0 through 7.4.4, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions when cookie security policy is enabled may allow an attacker, under specific conditions, to retrieve the initial encrypted and signed cookie protected by the feature
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*

History

20 Sep 2024, 19:43

Type Values Removed Values Added
References () https://fortiguard.fortinet.com/psirt/FG-IR-22-256 - () https://fortiguard.fortinet.com/psirt/FG-IR-22-256 - Vendor Advisory
First Time Fortinet
Fortinet fortiadc
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.7
CWE CWE-358 NVD-CWE-noinfo
CPE cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*

10 Sep 2024, 15:50

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-10 15:15

Updated : 2024-09-20 19:43


NVD link : CVE-2024-36511

Mitre link : CVE-2024-36511


JSON object : View

Products Affected

fortinet

  • fortiadc