Vulnerability Description
An exposure of sensitive information to an unauthorized actor [CWE-200] in Fortinet FortiManager before 7.4.2, FortiAnalyzer before 7.4.2 and FortiAnalyzer-BigData before 7.2.5 may allow a privileged attacker with administrative read permissions to read event logs of another adom via crafted HTTP or HTTPs requests.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortianalyzer | >= 6.2.0, < 7.4.3 |
| Fortinet | Fortianalyzer Big Data | >= 6.2.1, < 7.2.6 |
| Fortinet | Fortimanager | >= 6.2.0, < 7.4.3 |
Related Weaknesses (CWE)
References
- https://fortiguard.fortinet.com/psirt/FG-IR-23-267Vendor Advisory
FAQ
What is CVE-2023-44255?
CVE-2023-44255 is a vulnerability with a CVSS score of 4.1 (MEDIUM). An exposure of sensitive information to an unauthorized actor [CWE-200] in Fortinet FortiManager before 7.4.2, FortiAnalyzer before 7.4.2 and FortiAnalyzer-BigData before 7.2.5 may allow a privileged ...
How severe is CVE-2023-44255?
CVE-2023-44255 has been rated MEDIUM with a CVSS base score of 4.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-44255?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortianalyzer, Fortinet Fortianalyzer Big Data, Fortinet Fortimanager.