Vulnerability Details CVE-2023-40720
An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiVoiceEntreprise version 7.0.0 through 7.0.1 and before 6.4.8 allows an authenticated attacker to read the SIP configuration of other users via crafted HTTP or HTTPS requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 2.0%
CVSS Severity
CVSS v3 Score 7.1
Products affected by CVE-2023-40720
-
cpe:2.3:a:fortinet:fortivoice:6.0.0
-
cpe:2.3:a:fortinet:fortivoice:6.0.1
-
cpe:2.3:a:fortinet:fortivoice:6.0.10
-
cpe:2.3:a:fortinet:fortivoice:6.0.11
-
cpe:2.3:a:fortinet:fortivoice:6.0.12
-
cpe:2.3:a:fortinet:fortivoice:6.0.2
-
cpe:2.3:a:fortinet:fortivoice:6.0.3
-
cpe:2.3:a:fortinet:fortivoice:6.0.4
-
cpe:2.3:a:fortinet:fortivoice:6.0.5
-
cpe:2.3:a:fortinet:fortivoice:6.0.6
-
cpe:2.3:a:fortinet:fortivoice:6.0.7
-
cpe:2.3:a:fortinet:fortivoice:6.0.8
-
cpe:2.3:a:fortinet:fortivoice:6.0.9
-
cpe:2.3:a:fortinet:fortivoice:6.4.0
-
cpe:2.3:a:fortinet:fortivoice:6.4.1
-
cpe:2.3:a:fortinet:fortivoice:6.4.2
-
cpe:2.3:a:fortinet:fortivoice:6.4.3
-
cpe:2.3:a:fortinet:fortivoice:6.4.4
-
cpe:2.3:a:fortinet:fortivoice:6.4.5
-
cpe:2.3:a:fortinet:fortivoice:6.4.6
-
cpe:2.3:a:fortinet:fortivoice:6.4.7
-
cpe:2.3:a:fortinet:fortivoice:6.4.8
-
cpe:2.3:a:fortinet:fortivoice:7.0.0
-
cpe:2.3:a:fortinet:fortivoice:7.0.1