An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-282 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-282 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-282 - Vendor Advisory |
23 May 2024, 16:38
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fortinet fortivoice
Fortinet |
|
CPE | cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:* |
|
References | () https://fortiguard.com/psirt/FG-IR-23-282 - Vendor Advisory | |
Summary |
|
14 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 17:15
Updated : 2024-11-21 08:20
NVD link : CVE-2023-40720
Mitre link : CVE-2023-40720
CVE.ORG link : CVE-2023-40720
JSON object : View
Products Affected
fortinet
- fortivoice
CWE
CWE-639
Authorization Bypass Through User-Controlled Key