cvelist/2024/46xxx/CVE-2024-46667.json
2025-01-14 15:01:02 +00:00

138 lines
5.7 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-46667",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of service",
"cweId": "CWE-770"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "FortiSIEM",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "7.1.0",
"version_value": "7.1.5"
},
{
"version_affected": "<=",
"version_name": "7.0.0",
"version_value": "7.0.3"
},
{
"version_affected": "<=",
"version_name": "6.7.0",
"version_value": "6.7.9"
},
{
"version_affected": "<=",
"version_name": "6.6.0",
"version_value": "6.6.5"
},
{
"version_affected": "<=",
"version_name": "6.5.0",
"version_value": "6.5.3"
},
{
"version_affected": "<=",
"version_name": "6.4.0",
"version_value": "6.4.4"
},
{
"version_affected": "<=",
"version_name": "6.3.0",
"version_value": "6.3.3"
},
{
"version_affected": "<=",
"version_name": "6.2.0",
"version_value": "6.2.1"
},
{
"version_affected": "<=",
"version_name": "6.1.0",
"version_value": "6.1.2"
},
{
"version_affected": "=",
"version_value": "5.4.0"
},
{
"version_affected": "<=",
"version_name": "5.3.0",
"version_value": "5.3.3"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-164",
"refsource": "MISC",
"name": "https://fortiguard.fortinet.com/psirt/FG-IR-24-164"
}
]
},
"solution": [
{
"lang": "en",
"value": "Please upgrade to FortiSIEM version 7.2.0 or above \nPlease upgrade to FortiSIEM version 7.1.6 or above"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:W/RC:C"
}
]
}
}