- CVE-2023-38545 - CWE-122 - Heap-based Buffer Overflow
This vulnerability, which has been assigned a CVSSv3 score of 9.8, is a heap-based buffer overflow vulnerability impacting both libcurl and curl, and may allow an attacker to perform remote code execution.
- CVE-2023-38546 - CWE-565 - Reliance on Cookies without Validation and Integrity Checking
This vulnerability, which has been assigned a CVSSv3 score of 3.7, is a cookie injection vulnerability affecting curl packages, and could allow an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.
- CVE-2023-41840 - CWE-426 - Untrusted Search Path
This vulnerability, which has been assigned a CVSSv3 score of 7.8, is an untrusted search path vulnerability impacting FortiClient Windows, and may allow an attacker to perform a DLL hijack.
- CVE-2022-40681 - CWE-863 - Incorrect Authorisation
This vulnerability, which has been assigned a CVSSv3 score of 7.1, is an incorrect authorisation vulnerability impacting FortiClient Windows, and may allow an attacker to perform arbitrary file deletion or denial of service.
- CVE-2023-36553 - CWE-78 - Improper Neutralisation of Special Elements used in an OS Command ('OS Command Injection')
This vulnerability, which has been assigned a CVSSv3 score of 9.3, is an improper neutralisation of special elements used in an OS command vulnerability in FortiSIEM, and may allow a remote unauthenticated attacker to execute unauthorised commands via crafted API requests.
- CVE-2023-41676 - CWE-200 - Exposure of Sensitive Information to an Unauthorised Actor
This vulnerability, which has been assigned a CVSSv3 score of 4.2, is an exposure of sensitive information to an unauthorised actor vulnerability in FortiSIEM, and may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.
- CVE-2023-45585 - CWE-532 - Insertion of Sensitive Information into Log File
This vulnerability, which has been assigned a CVSSv3 score of 2.1, is an insertion of sensitive information into log file vulnerability in FortiSIEM, and may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.