CVE-2023-40720
HIGHDescription
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | fortivoice |
| fortinet | fortivoice |
| fortinet | fortivoice |
| fortinet | fortivoice |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2023-40720? +
How severe is CVE-2023-40720? +
What products are affected by CVE-2023-40720? +
How do I check if I'm vulnerable to CVE-2023-40720? +
Related Vulnerabilities
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, the `load_customer_info` action in `POST /conversation/ajax` …
Horilla is a free and open source Human Resource Management System (HRMS). In 1.5.0, an insecure direct object reference in …
Horilla is a free and open source Human Resource Management System (HRMS). In 1.5.0, an insecure direct object reference in …
A vulnerability in SpiceJet’s booking API allows unauthenticated users to query passenger name records (PNRs) without any access controls. Because …
Authenticated user can bypass authorization in Ribblr - Crochet & Knitting iOS application
A critical IDOR vulnerability has been discovered in Comet Backup affecting all versions from 20.11.0 to 26.1.1 and 26.2.1. The …