CVE-2023-42787
Fortinet FortiManager vulnerability analysis and mitigation

Overview

A client-side enforcement of server-side security vulnerability (CVE-2023-42787) was discovered in Fortinet FortiManager and FortiAnalyzer. The vulnerability was disclosed on October 10, 2023, affecting FortiManager version 7.4.0 and versions before 7.2.3, as well as FortiAnalyzer version 7.4.0 and versions before 7.2.3. This security flaw was identified by security researchers from Orange Cyberdéfense and Orange CERT-CC (Fortinet Advisory).

Technical details

The vulnerability is classified as CWE-602 (Client-Side Enforcement of Server-Side Security) with a CVSS v3.1 base score of 6.5 MEDIUM. The vulnerability stems from improper server-side control on the JSConsole usage for low-privileged users and insufficient permission control for sensitive JSConsole commands. The technical assessment reveals that the flaw can be exploited through client-side code execution, allowing unauthorized access to privileged web console features (Orange Advisory, NVD).

Impact

The vulnerability allows a remote attacker with low privileges to access sensitive configuration information, including encrypted passwords and certificates, concerning all registered FortiGate devices, regardless of ADOM segmentation. This represents a significant breach of access control mechanisms, potentially exposing confidential system information to unauthorized users (Orange Advisory).

Mitigation and workarounds

Fortinet has released security patches to address this vulnerability. FortiManager users should upgrade to version 7.4.1 or above for 7.4.x versions, 7.2.4 or above for 7.2.x versions, and 7.0.10 or above for 7.0.x versions. FortiAnalyzer users should upgrade to version 7.2.6 or above for 7.2.x versions, while users of versions 7.0.x, 6.4.x, and 6.2.x should migrate to a fixed release (Fortinet Advisory).

Additional resources


SourceThis report was generated using AI

Related Fortinet FortiManager vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-50571HIGH7.2
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesOct 14, 2025
CVE-2024-52964MEDIUM6.5
  • Fortinet FortiManagerFortinet FortiManager
  • cpe:2.3:a:fortinet:fortimanager
NoYesAug 12, 2025
CVE-2024-47569MEDIUM4.3
  • FortiOSFortiOS
  • cpe:2.3:a:fortinet:fortiweb
NoYesOct 14, 2025
CVE-2024-54020MEDIUM4.3
  • Fortinet FortiManagerFortinet FortiManager
  • cpe:2.3:a:fortinet:fortimanager
NoYesMay 28, 2025
CVE-2025-24474LOW2.7
  • Fortinet FortiManagerFortinet FortiManager
  • cpe:2.3:a:fortinet:fortimanager
NoYesJul 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management