Unauthenticated user can determine software-version information

Summary

An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiMail may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file.

Affected Products

FortiMail versions 6.0.9 and below.
FortiMail versions 6.2.4 and below
FortiMail versions 6.4.1 and below.

FortiDDoS version 5.4.0.
FortiDDoS version 5.3.2 and below.
FortiDDoS version 5.2.0.
FortiDDoS version 5.1.0.
FortiDDoS version 5.0.0.
FortiDDoS version 4.7.0.
FortiDDoS version 4.6.0.
FortiDDoS version 4.5.0.
FortiDDoS version 4.4.2 and below.

FortiDDoS-CM version 5.3.0.
FortiDDoS-CM version 5.2.0.
FortiDDoS-CM version 5.1.0.
FortiDDoS-CM version 5.0.0.
FortiDDoS-CM version 4.7.0.

FortiVoice version 6.0.6 and below.

FortiRecorder version 6.0.3 and below.

Solutions

Please upgrade to FortiMail versions 6.0.10 or above.
Please upgrade to FortiMail versions 6.2.5 or above.
Please upgrade to FortiMail versions 6.4.2 or above.

Please upgrade to FortiDDoS versions 5.5.0 or above.
Please upgrade to FortiDDoS versions 5.4.3 or above.

Please upgrade to FortiDDoS-CM versions 5.4.1 or above.

Please upgrade to FortiVoice versions 6.4.0 or above.
Please upgrade to FortiVoice versions 6.0.7 or above.

Please upgrade to FortiRecorder versions 6.0.4 or above.

Acknowledgement

Fortinet is pleased to thank Patrick Schmid from Redguard for reporting this vulnerability under responsible disclosure.

Timeline

2025-03-28: Products impacted updated