7.1
CVE-2023-40720
- EPSS 0.04%
- Veröffentlicht 14.05.2024 17:15:19
- Zuletzt bearbeitet 21.11.2024 08:20:01
- Quelle psirt@fortinet.com
- Teams Watchlist Login
- Unerledigt Login
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ Fortivoice Version >= 6.0.0 <= 6.0.12
Fortinet ≫ Fortivoice Version >= 6.4.0 <= 6.4.8
Fortinet ≫ Fortivoice Version7.0.0
Fortinet ≫ Fortivoice Version7.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.122 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
|
psirt@fortinet.com | 7.1 | 2.8 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.