An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-439 |
|
History
Tue, 18 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Mar 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request. | |
| First Time appeared |
Fortinet
Fortinet fortimail |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:a:fortinet:fortimail:7.4.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortinet
Fortinet fortimail |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published: 2025-03-18T13:56:56.681Z
Updated: 2025-03-19T03:55:48.590Z
Reserved: 2023-11-06T10:35:25.828Z
Link: CVE-2023-47539
Updated: 2025-03-18T14:14:23.788Z
Status : Analyzed
Published: 2025-03-18T14:15:37.830
Modified: 2025-07-24T19:11:16.637
Link: CVE-2023-47539
No data.