<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Full path disclosure vulnerability</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-23-126</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2023-09-13T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2023-09-13T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2023-09-13T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiSIEM may allow an authenticated attacker to obtain the absolute path of files used by the supervisor, which could be dangerous if used in conjunction with other vulnerabilities.
        </cvrf:Note>
        <cvrf:Note Title="Description" Type="General" Ordinal="2">
            None
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="3">
            Information disclosure
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="4">
            FortiSIEM 7.0 all versions are not affectedFortiSIEM version 6.7.0 through 6.7.5FortiSIEM 6.6 all versions are not affectedFortiSIEM 6.5 all versions are not affectedFortiSIEM 6.4 all versions are not affectedFortiSIEM 6.3 all versions are not affectedFortiSIEM 6.2 all versions are not affectedFortiSIEM 6.1 all versions are not affectedFortiSIEM 5.4 all versions are not affectedFortiSIEM 5.3 all versions are not affected
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="5">
            Please upgrade to FortiSIEM version 7.0.0 or abovePlease upgrade to FortiSIEM version 6.7.6 or abovePlease upgrade to FortiSIEM version 6.6.0 or above
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Internally discovered and reported by Adham El karn of Fortinet Product Security team.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <ProductTree>
        <Branch Name="Fortinet" Type="Vendor">
            <Branch Name="FortiSIEM" Type="Product Name">
                <Branch Name="6.7.5" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.5">FortiSIEM 6.7.5</FullProductName>
                </Branch>
                <Branch Name="6.7.4" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.4">FortiSIEM 6.7.4</FullProductName>
                </Branch>
                <Branch Name="6.7.3" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.3">FortiSIEM 6.7.3</FullProductName>
                </Branch>
                <Branch Name="6.7.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.2">FortiSIEM 6.7.2</FullProductName>
                </Branch>
                <Branch Name="6.7.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.1">FortiSIEM 6.7.1</FullProductName>
                </Branch>
                <Branch Name="6.7.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.0">FortiSIEM 6.7.0</FullProductName>
                </Branch>
            </Branch>
        </Branch>
    </ProductTree>
    <Vulnerability Ordinal="1">
        <Title>Full path disclosure vulnerability</Title>
        <cvrf:CVE>CVE-2023-36551</cvrf:CVE>
        <ProductStatuses>
            <Status Type="Known Affected">
                <ProductID>FortiSIEM-6.7.5</ProductID>
                <ProductID>FortiSIEM-6.7.4</ProductID>
                <ProductID>FortiSIEM-6.7.3</ProductID>
                <ProductID>FortiSIEM-6.7.2</ProductID>
                <ProductID>FortiSIEM-6.7.1</ProductID>
                <ProductID>FortiSIEM-6.7.0</ProductID>
            </Status>
        </ProductStatuses>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>4.2</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-23-126</URL>
                <Description>Full path disclosure vulnerability</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>