// For flags

CVE-2024-23111

 

Severity Score

6.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file.

Un uso de hash de contraseña con vulnerabilidad de esfuerzo computacional insuficiente [CWE-916] que afecta a FortiOS versión 7.4.3 e inferior, 7.2 todas las versiones, 7.0 todas las versiones, 6.4 todas las versiones y FortiProxy versión 7.4.2 e inferior, 7.2 todas las versiones, 7.0 todas versiones, 2.0, todas las versiones pueden permitir que un atacante privilegiado con perfil de superadministrador y acceso CLI pueda descifrar el archivo de copia de seguridad.

An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions reboot page may allow a remote privileged attacker with super-admin access to execute JavaScript code via crafted HTTP GET requests.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-01-11 CVE Reserved
  • 2024-06-11 CVE Published
  • 2024-08-19 CVE Updated
  • 2024-08-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fortinet
Search vendor "Fortinet"
FortiOS
Search vendor "Fortinet" for product "FortiOS"
>= 7.4.0 <= 7.4.2
Search vendor "Fortinet" for product "FortiOS" and version " >= 7.4.0 <= 7.4.2"
en
Affected
Fortinet
Search vendor "Fortinet"
FortiOS
Search vendor "Fortinet" for product "FortiOS"
>= 7.2.0 <= 7.2.6
Search vendor "Fortinet" for product "FortiOS" and version " >= 7.2.0 <= 7.2.6"
en
Affected
Fortinet
Search vendor "Fortinet"
FortiOS
Search vendor "Fortinet" for product "FortiOS"
>= 7.0.0 <= 7.0.13
Search vendor "Fortinet" for product "FortiOS" and version " >= 7.0.0 <= 7.0.13"
en
Affected
Fortinet
Search vendor "Fortinet"
FortiProxy
Search vendor "Fortinet" for product "FortiProxy"
>= 7.4.0 <= 7.4.2
Search vendor "Fortinet" for product "FortiProxy" and version " >= 7.4.0 <= 7.4.2"
en
Affected
Fortinet
Search vendor "Fortinet"
FortiProxy
Search vendor "Fortinet" for product "FortiProxy"
>= 7.2.0 <= 7.2.8
Search vendor "Fortinet" for product "FortiProxy" and version " >= 7.2.0 <= 7.2.8"
en
Affected
Fortinet
Search vendor "Fortinet"
FortiProxy
Search vendor "Fortinet" for product "FortiProxy"
>= 7.0.0 <= 7.0.14
Search vendor "Fortinet" for product "FortiProxy" and version " >= 7.0.0 <= 7.0.14"
en
Affected