CVE-2023-50180
MEDIUMDescription
An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiADC version 7.4.1 and below, version 7.2.3 and below, version 7.1.4 and below, version 7.0.5 and below, version 6.2.6 and below may allow a read-only admin to view data pertaining to other admins.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | fortiadc |
| fortinet | fortiadc |
| fortinet | fortiadc |
| fortinet | fortiadc |
| fortinet | fortiadc |
| fortinet | fortiadc |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2023-50180? +
How severe is CVE-2023-50180? +
What products are affected by CVE-2023-50180? +
How do I check if I'm vulnerable to CVE-2023-50180? +
Related Vulnerabilities
Exposure of Private Personal Information to an Unauthorized Actor, : Exposure of Sensitive System Information to an Unauthorized Control Sphere …
An Exposure of Sensitive System Information to an Unauthorized Control Sphere and Initialization of a Resource with an Insecure Default …
SES safely executes third-party JavaScript 'strict' mode programs in compartments that have no excess authority in their global scope. Prior …
The affected products could allow an unauthenticated attacker to access system information that could enable further access to sensitive files …
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in OpenText Advanced Authentication allows Information Elicitation. The vulnerability …
An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS® software enables an unauthorized user to view …