mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
138 lines
5.7 KiB
JSON
138 lines
5.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-46667",
|
|
"ASSIGNER": "psirt@fortinet.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Denial of service",
|
|
"cweId": "CWE-770"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Fortinet",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "FortiSIEM",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "7.1.0",
|
|
"version_value": "7.1.5"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "7.0.0",
|
|
"version_value": "7.0.3"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.7.0",
|
|
"version_value": "6.7.9"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.6.0",
|
|
"version_value": "6.6.5"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.5.0",
|
|
"version_value": "6.5.3"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.4.0",
|
|
"version_value": "6.4.4"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.3.0",
|
|
"version_value": "6.3.3"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.2.0",
|
|
"version_value": "6.2.1"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.1.0",
|
|
"version_value": "6.1.2"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "5.4.0"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "5.3.0",
|
|
"version_value": "5.3.3"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-164",
|
|
"refsource": "MISC",
|
|
"name": "https://fortiguard.fortinet.com/psirt/FG-IR-24-164"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Please upgrade to FortiSIEM version 7.2.0 or above \nPlease upgrade to FortiSIEM version 7.1.6 or above"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.9,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:W/RC:C"
|
|
}
|
|
]
|
|
}
|
|
} |