CVE-2023-40720

An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-23-282 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:*

History

23 May 2024, 16:38

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:*
Summary
  • (es) Una omisión de autorización a través de una vulnerabilidad de clave controlada por el usuario [CWE-639] en FortiVoiceEntreprise versión 7.0.0 a 7.0.1 y anteriores a 6.4.8 permite a un atacante autenticado leer la configuración SIP de otros usuarios a través de solicitudes HTTP o HTTPS manipuladas.
References () https://fortiguard.com/psirt/FG-IR-23-282 - () https://fortiguard.com/psirt/FG-IR-23-282 - Vendor Advisory
First Time Fortinet fortivoice
Fortinet

14 May 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 17:15

Updated : 2024-05-23 16:38


NVD link : CVE-2023-40720

Mitre link : CVE-2023-40720

CVE.ORG link : CVE-2023-40720


JSON object : View

Products Affected

fortinet

  • fortivoice
CWE
CWE-639

Authorization Bypass Through User-Controlled Key