Vulnerability Description
An improper privilege management vulnerability [CWE-269] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions API may allow a remote and authenticated API admin user to access some system settings such as the mail server settings through the API via a stolen GUI session ID.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortianalyzer | >= 6.0.0, < 6.4.12 |
| Fortinet | Fortimanager | >= 6.4.0, < 6.4.12 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/psirt/FG-IR-22-522Vendor Advisory
- https://fortiguard.com/psirt/FG-IR-22-522Vendor Advisory
FAQ
What is CVE-2023-36638?
CVE-2023-36638 is a vulnerability with a CVSS score of 4.3 (MEDIUM). An improper privilege management vulnerability [CWE-269] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiAnalyzer 7.2.0 thro...
How severe is CVE-2023-36638?
CVE-2023-36638 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-36638?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortianalyzer, Fortinet Fortimanager.