An improper authorization vulnerability [CWE-285] in FortiPortal version 7.2.0, and versions 7.0.6 and below reports may allow a user to download other organizations reports via modification in the request payload.
Max CVSS
4.3
EPSS Score
0.04%
Published
2024-03-12
Updated
2024-03-21
An improper access control vulnerability [CWE-284] in FortiOS version 7.2.0, version 7.0.13 and below, version 6.4.14 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below may allow a remote unauthenticated attacker to bypass the firewall deny geolocalisation policy via timing the bypass with a GeoIP database update.
Max CVSS
5.3
EPSS Score
0.07%
Published
2023-12-13
Updated
2023-12-18
An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2.6 and below, and versions 7.0.12 and below when configured with FortiAuthenticator in HA may allow a readonly user to gain read-write access via successive login attempts.
Max CVSS
8.8
EPSS Score
0.04%
Published
2024-03-12
Updated
2024-03-21
A improper access control in Fortinet FortiPortal version 7.0.0 through 7.0.6, Fortinet FortiPortal version 7.2.0 through 7.2.1 allows attacker to escalate its privilege via specifically crafted HTTP requests.
Max CVSS
8.8
EPSS Score
0.05%
Published
2024-01-10
Updated
2024-01-17
** UNSUPPORTED WHEN ASSIGNED **An improper authentication vulnerability [CWE-287] in Fortinet FortiWAN version 5.2.0 through 5.2.1 and version 5.1.1 through 5.1.2 may allow an authenticated attacker to escalate his privileges via HTTP or HTTPs requests with crafted JWT token values.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-12-13
Updated
2023-12-18
An improper access control vulnerability [CWE-284] in FortiEDRCollectorWindows version 5.2.0.4549 and below, 5.0.3.1007 and below, 4.0 all may allow a local attacker to prevent the collector service to start in the next system reboot by tampering with some registry keys of the service.
Max CVSS
5.5
EPSS Score
0.04%
Published
2023-11-14
Updated
2023-11-21
An improper authorization vulnerability [CWE-285] in Fortinet FortiADC version 7.4.0 and before 7.2.2 may allow a low privileged user to read or backup the full system configuration via HTTP or HTTPS requests.
Max CVSS
7.1
EPSS Score
0.05%
Published
2023-12-13
Updated
2023-12-15
An improper authorization vulnerability [CWE-285] in FortiMail webmail version 7.2.0 through 7.2.2 and before 7.0.5 allows an authenticated attacker to see and modify the title of address book folders of other users via crafted HTTP or HTTPs requests.
Max CVSS
5.4
EPSS Score
0.04%
Published
2023-11-14
Updated
2023-11-20
A improper access control in Fortinet FortiManager version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.10, version 6.4.0 through 6.4.13, 6.2 all versions allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
Max CVSS
9.8
EPSS Score
0.09%
Published
2024-03-12
Updated
2024-03-15
An improper access control vulnerability [CWE-284] in FortiADC automation feature 7.1.0 through 7.1.2, 7.0 all versions, 6.2 all versions, 6.1 all versions may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-11-14
Updated
2023-11-20
A relative path traversal vulnerability [CWE-23] in FortiWeb version 7.0.1 and below, 6.4 all versions, 6.3 all versions, 6.2 all versions may allow an authenticated user to obtain unauthorized access to files and data via specifically crafted web requests.
Max CVSS
6.5
EPSS Score
0.07%
Published
2023-02-16
Updated
2023-02-28
A weak authentication vulnerability [CWE-1390] in FortiNAC-F version 7.2.0, FortiNAC version 9.4.2 and below, 9.2 all versions, 9.1 all versions, 8.8 all versions, 8.7 all versions in device registration page may allow an unauthenticated attacker to perform password spraying attacks with an increased chance of success.
Max CVSS
7.5
EPSS Score
0.10%
Published
2023-05-03
Updated
2023-05-11
A relative path traversal vulnerability [CWE-23] in FortiWeb 7.0.0 through 7.0.1, 6.3.6 through 6.3.18, 6.4 all versions may allow an authenticated attacker to obtain unauthorized access to files and data via specifically crafted HTTP GET requests.
Max CVSS
6.5
EPSS Score
0.09%
Published
2023-02-16
Updated
2023-02-24
A improper authentication vulnerability in Fortinet FortiSIEM before 6.5.0 allows a local attacker with CLI access to perform operations on the Glassfish server directly via a hardcoded password.
Max CVSS
7.8
EPSS Score
0.04%
Published
2022-11-02
Updated
2022-11-03
A improper authentication in Fortinet FortiAuthenticator version 6.4.0 allows user to bypass the second factor of authentication via a RADIUS login portal.
Max CVSS
8.1
EPSS Score
0.07%
Published
2021-12-09
Updated
2021-12-10
An improper authentication vulnerability in FSSO Collector version 5.0.295 and below may allow an unauthenticated user to bypass a FSSO firewall policy and access the protected network via sending specifically crafted UDP login notification packets.
Max CVSS
9.6
EPSS Score
0.07%
Published
2021-07-12
Updated
2021-08-02
An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler.
Max CVSS
5.4
EPSS Score
0.05%
Published
2021-09-30
Updated
2021-10-08
Multiple Path traversal vulnerabilities in the Webmail of FortiMail before 6.4.4 may allow a regular user to obtain unauthorized access to files and data via specifically crafted web requests.
Max CVSS
8.8
EPSS Score
0.09%
Published
2021-07-12
Updated
2021-07-13
Improper limitation of a pathname to a restricted directory vulnerabilities in FortiSandbox 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 may allow an authenticated user to obtain unauthorized access to files and data via specifially crafted web requests.
Max CVSS
8.1
EPSS Score
0.09%
Published
2021-08-04
Updated
2021-08-11

CVE-2020-12812

Known exploited
Used for ransomware
An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.
Max CVSS
9.8
EPSS Score
2.92%
Published
2020-07-24
Updated
2024-02-13
CISA KEV Added
2021-11-03

CVE-2020-9294

Public exploit
An improper authentication vulnerability in FortiMail 5.4.10, 6.0.7, 6.2.2 and earlier and FortiVoiceEntreprise 6.0.0 and 6.0.1 may allow a remote unauthenticated attacker to access the system as a legitimate user by requesting a password change via the user interface.
Max CVSS
9.8
EPSS Score
2.10%
Published
2020-04-27
Updated
2024-01-18

CVE-2018-13382

Known exploited
Used for ransomware
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
Max CVSS
9.1
EPSS Score
88.70%
Published
2019-06-04
Updated
2021-06-03
CISA KEV Added
2022-01-10
The diagnosis_control.php page in Fortinet FortiWan (formerly AscernLink) before 4.2.5 allows remote authenticated users to download PCAP files via vectors related to the UserName GET parameter.
Max CVSS
6.5
EPSS Score
0.14%
Published
2016-09-21
Updated
2016-09-21
FortiOS 5.2.3, when configured to use High Availability (HA) and the dedicated management interface is enabled, does not require authentication for access to the ZebOS shell on the HA dedicated management interface, which allows remote attackers to obtain shell access via unspecified vectors.
Max CVSS
9.3
EPSS Score
0.72%
Published
2015-10-15
Updated
2016-12-03
24 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!