7.1
CVE-2023-40720
- EPSS 0.04%
- Published 14.05.2024 17:15:19
- Last modified 21.11.2024 08:20:01
- Source psirt@fortinet.com
- Teams watchlist Login
- Open Login
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
Data is provided by the National Vulnerability Database (NVD)
Fortinet ≫ Fortivoice Version >= 6.0.0 <= 6.0.12
Fortinet ≫ Fortivoice Version >= 6.4.0 <= 6.4.8
Fortinet ≫ Fortivoice Version7.0.0
Fortinet ≫ Fortivoice Version7.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.122 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
|
psirt@fortinet.com | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.