CVE-2024-23112

EUVD-2024-20637
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8 HIGH
ADJACENT_NETWORK
HIGH
LOW
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
Affected Products (NVD)
VendorProductVersion
fortinetfortiproxy
7.0.0 ≤
𝑥
≤ 7.0.14
fortinetfortiproxy
7.2.0 ≤
𝑥
≤ 7.2.8
fortinetfortiproxy
7.4.0 ≤
𝑥
≤ 7.4.2
fortinetfortios
6.4.7 ≤
𝑥
≤ 6.4.14
fortinetfortios
7.0.1 ≤
𝑥
≤ 7.0.13
fortinetfortios
7.2.0 ≤
𝑥
≤ 7.2.6
fortinetfortios
7.4.0 ≤
𝑥
≤ 7.4.1
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
fortinetfortios
7.4.0 ≤
𝑥
≤ 7.4.1
ADP
fortinetfortios
7.2.0 ≤
𝑥
≤ 7.2.6
ADP
fortinetfortios
7.0.1 ≤
𝑥
≤ 7.0.13
ADP
fortinetfortios
6.4.7 ≤
𝑥
≤ 6.4.14
ADP
fortinetfortiproxy
7.4.0 ≤
𝑥
≤ 7.4.2
ADP
fortinetfortiproxy
7.2.0 ≤
𝑥
≤ 7.2.8
ADP
fortinetfortiproxy
7.0.0 ≤
𝑥
≤ 7.0.14
ADP