A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows attacker to execute unauthorized code or commands via targeted social engineering attack
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-493 |
History
Thu, 12 Dec 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortios Fortinet fortiproxy |
|
CPEs | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortios Fortinet fortiproxy |
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-04-09T14:24:21.614Z
Updated: 2024-08-02T19:01:35.404Z
Reserved: 2023-08-30T13:42:39.547Z
Link: CVE-2023-41677
Vulnrichment
Updated: 2024-08-02T19:01:35.404Z
NVD
Status : Analyzed
Published: 2024-04-09T15:15:27.400
Modified: 2024-12-12T19:22:04.470
Link: CVE-2023-41677
Redhat
No data.