CVE-2024-6789
A path traversal issue in API endpoint in M-Files Server before version 24.8.13981.0 and LTS 24.2.13421.15 SR2 and LTS 23.8.12892.0 SR6 allows authenticated user to read files
Attack Parameters
Technical Impact
Time Line
Key Metrics
Recommended Solution
Related News Articles
2 article(s) mentioning this vulnerability
Fortinet corrige une vulnérabilité critique dans FortiSIEM, correctif OS injection CVE-2024-6789
Fortinet publie un correctif critique pour une vulnérabilité d'injection OS dans FortiSIEM, renforçant les protocoles de sécurité et protégeant contre…
Fortinet Addresses Severe FortiSIEM Flaw, Patching OS Injection Vulnerability CVE-2024-6789
Fortinet releases critical patch for OS injection vulnerability in FortiSIEM, enhancing security protocols and protecting against unauthenticated remote code execution.
Immediate Action Plan
1. Inventory
Identify all affected systems in your infrastructure.
2. Assessment
Assess exposure and criticality for your organization.
3. Mitigation
Apply patches or available workarounds.
4. Verification
Test and confirm effectiveness of applied measures.
