{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2024-006.pdf"
    },
    "title": "High Vulnerability in FortiOS & FortiProxy",
    "serial_number": "2024-006",
    "publish_date": "11-01-2024 15:09:26",
    "description": "On January 9, 2024, Fortinet disclosed a high vulnerability in FortiOS & FortiProxy. This vulnerability, tracked as \"CVE-2023-44250\" and with a CVSS score of 8.3, could allow an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.<br>\n",
    "url_title": "2024-006",
    "content_markdown": "---\ntitle: 'High Vulnerability in\u00a0FortiOS\u00a0&\u00a0FortiProxy'\nnumber: '2024-006'\nversion: '1.0'\noriginal_date: 'January 9, 2024'\ndate: 'January 11, 2024'\n---\n\n_History:_\n\n* _11/01/2024 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn January 9, 2024, Fortinet disclosed a high vulnerability in FortiOS & FortiProxy. This vulnerability, tracked as `CVE-2023-44250` and with a CVSS score of 8.3, could allow an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.\n\n# Technical Details\n\nThe bug is due to an improper privilege management vulnerability in a FortiOS & FortiProxy HA cluster. If exploited, this vulnerability could allow an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.\n\n# Affected products\n\nThe following versions are affected:\n\n- FortiOS 7.4, from 7.4.0 through 7.4.1;\n- FortiOS 7.2.5;\n- FortiProxy 7.4, from 7.4.0 through 7.4.1;\n\n# Recommendations \n\nCERT-EU recommends upgrading as soon as possible to a fixed version.\n\n# References\n\n[1] <https://www.fortiguard.com/psirt/FG-IR-23-315>\n\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>11/01/2024 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On January 9, 2024, Fortinet disclosed a high vulnerability in FortiOS &amp; FortiProxy. This vulnerability, tracked as <code>CVE-2023-44250</code> and with a CVSS score of 8.3, could allow an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.</p><h2 id=\"technical-details\">Technical Details</h2><p>The bug is due to an improper privilege management vulnerability in a FortiOS &amp; FortiProxy HA cluster. If exploited, this vulnerability could allow an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.</p><h2 id=\"affected-products\">Affected products</h2><p>The following versions are affected:</p><ul><li>FortiOS 7.4, from 7.4.0 through 7.4.1;</li><li>FortiOS 7.2.5;</li><li>FortiProxy 7.4, from 7.4.0 through 7.4.1;</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends upgrading as soon as possible to a fixed version.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.fortiguard.com/psirt/FG-IR-23-315\">https://www.fortiguard.com/psirt/FG-IR-23-315</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}