-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0904
       Authorizations Bypass in the FortiPresence portal parameters
                               12 March 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           FortiPresence
Publisher:         Fortinet
Operating System:  Network Appliance
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-6642 CVE-2020-6641 

Original Bulletin: 
   https://fortiguard.com/psirt/FG-IR-19-258

- --------------------------BEGIN INCLUDED TEXT--------------------

Authorizations Bypass in the FortiPresence portal parameters

IR Number : FG-IR-19-258
Date      : Mar 09, 2020
Risk      : 3/5
Impact    : Improper Access Control
CVE ID    : CVE-2020-6641, CVE-2020-6642

Summary

Two authorization bypass through user-controlled key vulnerabilities in the
FortiPresence administration interface may allow an attacker to gain access to
some user data via portal manager or portal users parameters.

Impact

Improper Access Control

Affected Products

FortiPresence 2.1.0 and below

Solutions

Please upgrade to FortiPresence 20.1 or above.
Starting in 2020, FortiPresence will employ a new version syntax.

Acknowledgement

Fortinet is pleased to thank SI9INT for reporting this vulnerability under
responsible disclosure.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=e+27
-----END PGP SIGNATURE-----