{"api_version":"1","generated_at":"2026-04-23T10:43:13+00:00","cve":"CVE-2024-23104","urls":{"html":"https://cve.report/CVE-2024-23104","api":"https://cve.report/api/cve/CVE-2024-23104.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-23104","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-23104"},"summary":{"title":"CVE-2024-23104","description":"An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiVoice 7.0.0 through 7.0.1 may allow a remote authenticated attacker with at least read-only permission on system maintenance to access backup information via crafted HTTP requests","state":"PUBLISHED","assigner":"fortinet","published_at":"2026-04-14 16:16:28","updated_at":"2026-04-20 18:03:06"},"problem_types":["CWE-200","CWE-200 Information disclosure"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"psirt@fortinet.com","type":"Secondary","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C","version":"3.1"}}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-124","name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-124","refsource":"psirt@fortinet.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-23104","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23104","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Fortinet","product":"FortiVoice","version":"affected 7.0.0 7.0.1 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.6.0","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.4.0 7.4.8 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.2.0 7.2.5 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.1.0 7.1.1 semver","platforms":[]},{"source":"CNA","vendor":"Fortinet","product":"FortiNDR","version":"affected 7.0.0 7.0.7 semver","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Upgrade to FortiVoice version 7.0.2 or above\nUpgrade to FortiVoice version 6.4.9 or above\nUpgrade to FortiNDR version 7.6.1 or above\nUpgrade to FortiNDR version 7.4.9 or above","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"23104","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fortinet","cpe5":"fortindr","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"23104","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fortinet","cpe5":"fortindr","cpe6":"7.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"23104","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fortinet","cpe5":"fortivoice","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2024","cve_id":"23104","cve":"CVE-2024-23104","epss":"0.000290000","percentile":"0.084610000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:40"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2024-23104","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-14T16:25:58.464987Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-14T16:46:15.501Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"FortiVoice","vendor":"Fortinet","versions":[{"lessThanOrEqual":"7.0.1","status":"affected","version":"7.0.0","versionType":"semver"}]},{"cpes":["cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.7:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.5:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortindr:7.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"FortiNDR","vendor":"Fortinet","versions":[{"status":"affected","version":"7.6.0"},{"lessThanOrEqual":"7.4.8","status":"affected","version":"7.4.0","versionType":"semver"},{"lessThanOrEqual":"7.2.5","status":"affected","version":"7.2.0","versionType":"semver"},{"lessThanOrEqual":"7.1.1","status":"affected","version":"7.1.0","versionType":"semver"},{"lessThanOrEqual":"7.0.7","status":"affected","version":"7.0.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiVoice 7.0.0 through 7.0.1 may allow a remote authenticated attacker with at least read-only permission on system maintenance to access backup information via crafted HTTP requests"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"Information disclosure","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T15:38:18.540Z","orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet"},"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-26-124","url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-124"}],"solutions":[{"lang":"en","value":"Upgrade to FortiVoice version 7.0.2 or above\nUpgrade to FortiVoice version 6.4.9 or above\nUpgrade to FortiNDR version 7.6.1 or above\nUpgrade to FortiNDR version 7.4.9 or above"}]}},"cveMetadata":{"assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","assignerShortName":"fortinet","cveId":"CVE-2024-23104","datePublished":"2026-04-14T15:38:18.540Z","dateReserved":"2024-01-11T16:29:07.978Z","dateUpdated":"2026-04-14T16:46:15.501Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 16:16:28","lastModifiedDate":"2026-04-20 18:03:06","problem_types":["CWE-200","CWE-200 Information disclosure"],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.0.2","matchCriteriaId":"5F6B6495-7CF4-4E5A-8497-9AF6D81C083B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.4.9","matchCriteriaId":"63871F8B-0798-4615-9781-9C7FA68C30AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*","matchCriteriaId":"9A1D8AE9-D9F9-402C-B8EB-58189200E0D6"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"23104","Ordinal":"1","Title":"CVE-2024-23104","CVE":"CVE-2024-23104","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"23104","Ordinal":"1","NoteData":"An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiVoice 7.0.0 through 7.0.1 may allow a remote authenticated attacker with at least read-only permission on system maintenance to access backup information via crafted HTTP requests","Type":"Description","Title":"CVE-2024-23104"}]}}}