TR-90 - Vulnerability identified as CVE-2023-34990, affecting Fortinet FortiWLM

You can report incidents via our official contact including e-mail, phone or use the Anonymous reporting form.

Search


CIRCL is accredited TI CIRCL is a FIRST member CIRCL is an OASIS member

A relative path traversal vulnerability has been discovered in Fortinet FortiWLM versions 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4. This vulnerability allows an attacker to execute unauthorized code or commands by sending specially crafted web requests.

Affected Products

  • Vendor: Fortinet
  • Product: FortiWLM
  • Versions:
    • 8.6.0 through 8.6.5 (inclusive)
    • 8.5.0 through 8.5.4 (inclusive)

Vulnerability Class

  • CWE-23: Relative Path Traversal
  • CWE-94: Improper Control of Generation of Code (‘Code Injection’)

Impact

Successful exploitation of this vulnerability could lead to the execution of arbitrary code or commands on the affected system.

Technical Analysis

Attack Vector

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged

CVSS Metrics

CNA CVSS Score

  • CVSS v3.1 Base Score: 9.6
  • CVSS v3.1 Base Severity: CRITICAL
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector (AV): Network (N)
  • Attack Complexity (AC): Low (L)
  • Privileges Required (PR): None (N)
  • User Interaction (UI): None (N)
  • Scope (S): Unchanged (U)
  • Confidentiality Impact (C): High (H)
  • Integrity Impact (I): High (H)
  • Availability Impact (A): High (H)

CISA ADP CVSS Score

  • CVSS v3.1 Base Score: 9.8
  • CVSS v3.1 Base Severity: CRITICAL
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector (AV): Network (N)
  • Attack Complexity (AC): Low (L)
  • Privileges Required (PR): None (N)
  • User Interaction (UI): None (N)
  • Scope (S): Unchanged (U)
  • Confidentiality Impact (C): High (H)
  • Integrity Impact (I): High (H)
  • Availability Impact (A): High (H)

CISA ADP SSVC

  • SSVC Version: 2.0.3
  • SSVC ID: CVE-2023-34990
  • Timestamp: 2024-12-19T00:00:00+00:00
  • Options:
    • Exploitation: None
    • Automatable: Yes
    • Technical Impact: Total
    • Role: CISA Coordinator

Mitigation

  • Upgrade to FortiWLM version 8.6.6 or later.
  • Upgrade to FortiWLM version 8.5.5 or later.

References

Additional Sightings

Mastodon

Bluesky

News

Classification of this document

TLP:CLEAR information may be distributed without restriction, subject to copyright controls.

Revision

  • Version 1.0 - TLP:CLEAR - First version - 20th December 2024