CVE-2023-26205
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An improper access control vulnerability [CWE-284] in FortiADC automation feature 7.1.0 through 7.1.2, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script.
Una vulnerabilidad de control de acceso inadecuado [CWE-284] en la función de automatización FortiADC 7.1.0 a 7.1.2, 7.0 todas las versiones, 6.2 todas las versiones, 6.1 todas las versiones puede permitir que un atacante autenticado con pocos privilegios escale sus privilegios a super_admin a través de una configuración manipulada del script CLI de automatización de fabric.
An improper access control vulnerability [CWE-284] in FortiADC automation feature 7.1.0 through 7.1.2, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-02-20 CVE Reserved
- 2023-11-14 CVE Published
- 2024-10-22 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-284: Improper Access Control
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-22-292 | 2023-11-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortiadc Search vendor "Fortinet" for product "Fortiadc" | >= 6.1.0 <= 6.1.6 Search vendor "Fortinet" for product "Fortiadc" and version " >= 6.1.0 <= 6.1.6" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiadc Search vendor "Fortinet" for product "Fortiadc" | >= 6.2.0 <= 6.2.6 Search vendor "Fortinet" for product "Fortiadc" and version " >= 6.2.0 <= 6.2.6" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiadc Search vendor "Fortinet" for product "Fortiadc" | >= 7.0.0 <= 7.0.5 Search vendor "Fortinet" for product "Fortiadc" and version " >= 7.0.0 <= 7.0.5" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiadc Search vendor "Fortinet" for product "Fortiadc" | 7.1.0 Search vendor "Fortinet" for product "Fortiadc" and version "7.1.0" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiadc Search vendor "Fortinet" for product "Fortiadc" | 7.1.1 Search vendor "Fortinet" for product "Fortiadc" and version "7.1.1" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiadc Search vendor "Fortinet" for product "Fortiadc" | 7.1.2 Search vendor "Fortinet" for product "Fortiadc" and version "7.1.2" | - |
Affected
|