An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-45277 An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.
Fixes

Solution

Please upgrade to FortiSIEM version 7.0.2 or above Please upgrade to FortiSIEM version 7.0.0 or above Please upgrade to FortiSIEM version 6.7.5 or above Please upgrade to FortiSIEM version 6.6.4 or above Please upgrade to FortiSIEM version 6.5.2 or above Please upgrade to FortiSIEM version 6.4.3 or above


Workaround

No workaround given by the vendor.

References
History

Wed, 23 Jul 2025 06:30:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*

Fri, 11 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00064}

epss

{'score': 0.00088}


Wed, 12 Mar 2025 01:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Mar 2025 00:00:00 +0900

Type Values Removed Values Added
Description An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-12T04:00:49.660Z

Reserved: 2023-08-21T09:03:44.316Z

Link: CVE-2023-40723

cve-icon Vulnrichment

Updated: 2025-03-11T16:03:47.219Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-11T15:15:39.843

Modified: 2025-07-22T21:21:00.950

Link: CVE-2023-40723

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T01:01:41Z

Weaknesses