cvelist/2023/34xxx/CVE-2023-34992.json
2023-10-10 17:00:39 +00:00

108 lines
4.2 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-34992",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via\u00a0crafted API requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands",
"cweId": "CWE-78"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "FortiSIEM",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "7.0.0"
},
{
"version_affected": "<=",
"version_name": "6.7.0",
"version_value": "6.7.5"
},
{
"version_affected": "<=",
"version_name": "6.6.0",
"version_value": "6.6.3"
},
{
"version_affected": "<=",
"version_name": "6.5.0",
"version_value": "6.5.1"
},
{
"version_affected": "<=",
"version_name": "6.4.0",
"version_value": "6.4.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-130",
"refsource": "MISC",
"name": "https://fortiguard.com/psirt/FG-IR-23-130"
}
]
},
"solution": [
{
"lang": "en",
"value": "Please upgrade to FortiSIEM version 7.0.1 or above\r\nPlease upgrade to FortiSIEM version 6.7.6 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.6.4 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.5.2 or above\r\nPlease upgrade to FortiSIEM upcoming version 6.4.3 or above"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X"
}
]
}
}