An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-282 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 May 2024, 16:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:* |
|
Summary |
|
|
References | () https://fortiguard.com/psirt/FG-IR-23-282 - Vendor Advisory | |
First Time |
Fortinet fortivoice
Fortinet |
14 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 17:15
Updated : 2024-05-23 16:38
NVD link : CVE-2023-40720
Mitre link : CVE-2023-40720
CVE.ORG link : CVE-2023-40720
JSON object : View
Products Affected
fortinet
- fortivoice
CWE
CWE-639
Authorization Bypass Through User-Controlled Key