CVE-2023-36638

EUVD-2023-40582
An improper privilege management vulnerability [CWE-269] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions API may allow a remote and authenticated API admin user to access some system settings such as the mail server settings through the API via a stolen GUI session ID.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
fortinetCNA
4.2 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
Affected Products (NVD)
VendorProductVersion
fortinetfortianalyzer
6.0.0 ≤
𝑥
< 6.4.12
fortinetfortianalyzer
7.0.0 ≤
𝑥
< 7.0.8
fortinetfortianalyzer
7.2.0 ≤
𝑥
< 7.2.3
fortinetfortimanager
6.4.0 ≤
𝑥
< 6.4.12
fortinetfortimanager
7.0.0 ≤
𝑥
< 7.0.8
fortinetfortimanager
7.2.0 ≤
𝑥
< 7.2.3
𝑥
= Vulnerable software versions