An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4 and 6.4.0 through 6.4.10 may allow a remote authenticated attacker to read the client machine password in plain text in a heartbeat response when a log-fetch request is made from the FortiAnalyzer
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-447 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-22-447 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:46
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.6 |
References | () https://fortiguard.com/psirt/FG-IR-22-447 - Vendor Advisory |
07 Nov 2023, 04:07
Type | Values Removed | Values Added |
---|---|---|
Summary | An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiAnalyzer versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4 and 6.4.0 through 6.4.10 may allow a remote authenticated attacker to read the client machine password in plain text in a heartbeat response when a log-fetch request is made from the FortiAnalyzer |
Information
Published : 2023-03-07 17:15
Updated : 2024-11-21 07:46
NVD link : CVE-2023-23776
Mitre link : CVE-2023-23776
CVE.ORG link : CVE-2023-23776
JSON object : View
Products Affected
fortinet
- fortianalyzer