--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical vulnerability in FortiSIEM' number: '2023-092' version: '1.1' original_date: 'November 14, 2023' date: 'November 21, 2023' --- _History:_ * _20/11/2023 --- v1.0 -- Initial publication_ * _21/11/2023 --- v1.1 -- Correction of the CVE ID_ # Summary On November 14, Fortinet released an advisory regarding a critical vulnerability affecting FortiSIEM which may allow a remote unauthenticated attacker to execute unauthorised commands via crafted API requests [1]. # Technical Details The vulnerability `CVE-2023-36553`, with a CVSS score of 9.3 out of 10, is due to an improper neutralisation of special elements in FortiSIEM report server. The exploitation of this vulnerability by a remote unauthenticated attacker could lead to the execution of unauthorised commands via crafted API requests. # Affected Products This vulnerability affects: - FortiSIEM 5.4 all versions; - FortiSIEM 5.3 all versions; - FortiSIEM 5.2 all versions; - FortiSIEM 5.1 all versions; - FortiSIEM 5.0 all versions; - FortiSIEM 4.10 all versions; - FortiSIEM 4.9 all versions; - FortiSIEM 4.7 all versions. # Recommendations It is recommended updating as soon as possible [1]. # References [1]