Improper Access Control in FortiADC Automation Feature by Fortinet
CVE-2023-26205

7.9HIGH

Key Information:

Vendor
Fortinet
Status
Vendor
CVE Published:
14 November 2023

Summary

An improper access control vulnerability exists in FortiADC's automation feature that could allow an authenticated low-privileged attacker to escalate their privileges to super_admin. This can be exploited through a specially crafted configuration of a fabric automation CLI script. Affected versions include FortiADC 7.1.0 to 7.1.2, as well as all versions of 7.0, 6.2, and 6.1. Organizations using these versions should review their configurations and take appropriate actions to mitigate potential risks.

Affected Version(s)

FortiADC 7.1.0 <= 7.1.2

FortiADC 7.0.0 <= 7.0.5

FortiADC 6.2.0 <= 6.2.6

References

CVSS V3.1

Score:
7.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.