{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-46667","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2024-09-11T12:14:59.204Z","datePublished":"2025-01-14T14:09:58.844Z","dateUpdated":"2025-02-18T21:37:18.364Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSIEM","cpes":[],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"7.1.0","lessThanOrEqual":"7.1.5","status":"affected"},{"versionType":"semver","version":"7.0.0","lessThanOrEqual":"7.0.3","status":"affected"},{"versionType":"semver","version":"6.7.0","lessThanOrEqual":"6.7.9","status":"affected"},{"versionType":"semver","version":"6.6.0","lessThanOrEqual":"6.6.5","status":"affected"},{"versionType":"semver","version":"6.5.0","lessThanOrEqual":"6.5.3","status":"affected"},{"versionType":"semver","version":"6.4.0","lessThanOrEqual":"6.4.4","status":"affected"},{"versionType":"semver","version":"6.3.0","lessThanOrEqual":"6.3.3","status":"affected"},{"versionType":"semver","version":"6.2.0","lessThanOrEqual":"6.2.1","status":"affected"},{"versionType":"semver","version":"6.1.0","lessThanOrEqual":"6.1.2","status":"affected"},{"version":"5.4.0","status":"affected"},{"versionType":"semver","version":"5.3.0","lessThanOrEqual":"5.3.3","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2025-01-14T14:09:58.844Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-770","description":"Denial of service","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.9,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:W/RC:C"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiSIEM version 7.2.0 or above \nPlease upgrade to FortiSIEM version 7.1.6 or above"}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-24-164","url":"https://fortiguard.fortinet.com/psirt/FG-IR-24-164"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-14T14:27:09.560945Z","id":"CVE-2024-46667","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-18T21:37:18.364Z"}}]}}