Improper Access Control in FortiADC Automation Feature by Fortinet
CVE-2023-26205
7.9HIGH
Summary
An improper access control vulnerability exists in FortiADC's automation feature that could allow an authenticated low-privileged attacker to escalate their privileges to super_admin. This can be exploited through a specially crafted configuration of a fabric automation CLI script. Affected versions include FortiADC 7.1.0 to 7.1.2, as well as all versions of 7.0, 6.2, and 6.1. Organizations using these versions should review their configurations and take appropriate actions to mitigate potential risks.
Affected Version(s)
FortiADC 7.1.0 <= 7.1.2
FortiADC 7.0.0 <= 7.0.5
FortiADC 6.2.0 <= 6.2.6
References
CVSS V3.1
Score:
7.9
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved