An observable response discrepancy vulnerability [CWE-204] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, and FortiSOAR 7.5.0, 7.4.0 through 7.4.4, 7.3.0 through 7.3.2, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to enumerate valid users via observing login request responses.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-071 |
![]() ![]() |
History
Fri, 31 Jan 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet forticlientems
|
|
Weaknesses | CWE-203 | |
CPEs | cpe:2.3:a:fortinet:forticlientems:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:forticlientems:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet forticlientems
|
Wed, 15 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An observable response discrepancy vulnerability [CWE-204] in FortiClientEMS 7.4.0, 7.2.0 through 7.2.4, 7.0 all versions, and FortiSOAR 7.5.0, 7.4.0 through 7.4.4, 7.3.0 through 7.3.2, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to enumerate valid users via observing login request responses. | |
First Time appeared |
Fortinet
Fortinet fortisoar |
|
Weaknesses | CWE-204 | |
CPEs | cpe:2.3:a:fortinet:fortisoar:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:6.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:6.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortisoar:7.5.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortisoar |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-01-15T14:51:13.708Z
Reserved: 2024-05-29T08:44:50.760Z
Link: CVE-2024-36510

Updated: 2025-01-15T14:51:05.823Z

Status : Analyzed
Published: 2025-01-14T14:15:30.737
Modified: 2025-01-31T16:30:50.753
Link: CVE-2024-36510

No data.