An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-439 |
![]() ![]() |
History
Tue, 18 Mar 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 18 Mar 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An improper access control vulnerability in FortiMail version 7.4.0 configured with RADIUS authentication and remote_wildcard enabled may allow a remote unauthenticated attacker to bypass admin login via a crafted HTTP request. | |
First Time appeared |
Fortinet
Fortinet fortimail |
|
Weaknesses | CWE-284 | |
CPEs | cpe:2.3:a:fortinet:fortimail:7.4.0:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet fortimail |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-19T03:55:48.590Z
Reserved: 2023-11-06T10:35:25.828Z
Link: CVE-2023-47539

Updated: 2025-03-18T14:14:23.788Z

Status : Received
Published: 2025-03-18T14:15:37.830
Modified: 2025-03-18T14:15:37.830
Link: CVE-2023-47539

No data.