60 lines
2.1 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-40591",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-02-11T17:15:22.810",
"lastModified": "2025-02-11T17:15:22.810",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An incorrect privilege assignment vulnerability [CWE-266] in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admin by connecting the targetted FortiGate to a malicious upstream FortiGate they control."
},
{
"lang": "es",
"value": "Una vulnerabilidad de asignaci\u00f3n incorrecta de privilegios [CWE-266] en Fortinet FortiOS versi\u00f3n 7.6.0, 7.4.0 a 7.4.4, 7.2.0 a 7.2.9 y anteriores a 7.0.15 permite que un administrador autenticado cuyo perfil de acceso tiene el permiso Security Fabric escale sus privilegios a superadministrador conectando el FortiGate objetivo a un FortiGate ascendente malicioso que controlan."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-302",
"source": "psirt@fortinet.com"
}
]
}