Cyber Posture

CVE-2023-40723

High

Published: 11 March 2025

Published
11 March 2025
Modified
22 July 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0037 58.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.

Security Summary

CVE-2023-40723 is an exposure of sensitive information vulnerability (CWE-200) affecting Fortinet FortiSIEM across multiple versions, including 6.7.0 through 6.7.4, 6.6.0 through 6.6.3, 6.5.0 through 6.5.1, 6.4.0 through 6.4.2, 6.3.0 through 6.3.3, 6.2.0 through 6.2.1, 6.1.0 through 6.1.2, 5.4.0, 5.3.0 through 5.3.3, 5.2.5 through 5.2.8, 5.2.1 through 5.2.2, and 5.1.0 through 5.1.3. The issue enables an attacker to execute unauthorized code or commands via an API request. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact despite elevated complexity.

A remote attacker with no privileges or user interaction required can exploit this vulnerability over the network, though it demands high attack complexity. Successful exploitation grants the attacker the ability to execute unauthorized code or commands, compromising confidentiality, integrity, and availability at a high level within the affected FortiSIEM instance.

The Fortinet PSIRT advisory FG-IR-23-117 at https://fortiguard.com/psirt/FG-IR-23-117 provides further details on patches and mitigation strategies.

Details

CWE(s)
CWE-200

Affected Products

fortinet
fortisiem
5.1.0 — 6.4.2 · 6.5.0 — 6.5.2 · 6.6.0 — 6.6.4

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

The vulnerability allows remote unauthenticated attackers to execute unauthorized code or commands via API requests on a public-facing FortiSIEM instance, directly enabling T1190 (Exploit Public-Facing Application) for initial access and T1059 (Command and Scripting Interpreter) for execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References