CVE-2024-46665
LOWDescription
An insertion of sensitive information into sent data vulnerability [CWE-201] in FortiOS 7.6.0, 7.4.0 through 7.4.4 may allow an attacker in a man-in-the-middle position to retrieve the RADIUS accounting server shared secret via intercepting accounting-requests.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | fortios |
| fortinet | fortios |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2024-46665? +
How severe is CVE-2024-46665? +
What products are affected by CVE-2024-46665? +
How do I check if I'm vulnerable to CVE-2024-46665? +
Related Vulnerabilities
Develocity (formerly Gradle Enterprise) before 2024.3.1 allows an attacker who has network access to a Develocity server to obtain the …
An unauthenticated HTTP GET request to the /client.php endpoint will disclose the default administrator user credentials.
When the device is shared, the homepage module are before 2.19.0 in eWeLink Cloud Service allows Secondary user to take …
YugabyteDB has been collecting diagnostics information from YugabyteDB servers, which may include sensitive gflag configurations. To mitigate this, we recommend …
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. The MongoDB …
Sentry-Javascript is an official Sentry SDKs for JavaScript. From version 10.11.0 to before 10.27.0, when a Node.js application using the …