Cyber Posture

CVE-2023-40723

High

Published: 11 March 2025

Published
11 March 2025
Modified
22 July 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0037 58.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-40723 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Fortinet Fortisiem. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 41.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2023-40723 by requiring timely identification, reporting, and patching of the specific flaw exposing sensitive information via API requests.

detect

Identifies CVE-2023-40723 through regular vulnerability scanning of FortiSIEM systems, enabling proactive remediation before exploitation.

prevent

Addresses exploitation of the API vulnerability by validating inputs to prevent crafted requests that trigger sensitive information exposure leading to code execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

The vulnerability allows remote unauthenticated attackers to execute unauthorized code or commands via API requests on a public-facing FortiSIEM instance, directly enabling T1190 (Exploit Public-Facing Application) for initial access and T1059 (Command and Scripting Interpreter) for execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2…

more

and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request.

Deeper analysisAI

CVE-2023-40723 is an exposure of sensitive information vulnerability (CWE-200) affecting Fortinet FortiSIEM across multiple versions, including 6.7.0 through 6.7.4, 6.6.0 through 6.6.3, 6.5.0 through 6.5.1, 6.4.0 through 6.4.2, 6.3.0 through 6.3.3, 6.2.0 through 6.2.1, 6.1.0 through 6.1.2, 5.4.0, 5.3.0 through 5.3.3, 5.2.5 through 5.2.8, 5.2.1 through 5.2.2, and 5.1.0 through 5.1.3. The issue enables an attacker to execute unauthorized code or commands via an API request. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact despite elevated complexity.

A remote attacker with no privileges or user interaction required can exploit this vulnerability over the network, though it demands high attack complexity. Successful exploitation grants the attacker the ability to execute unauthorized code or commands, compromising confidentiality, integrity, and availability at a high level within the affected FortiSIEM instance.

The Fortinet PSIRT advisory FG-IR-23-117 at https://fortiguard.com/psirt/FG-IR-23-117 provides further details on patches and mitigation strategies.

Details

CWE(s)

Affected Products

fortinet
fortisiem
5.1.0 — 6.4.2 · 6.5.0 — 6.5.2 · 6.6.0 — 6.6.4

CVEs Like This One

CVE-2025-64155Same product: Fortinet Fortisiem
CVE-2025-25256Same product: Fortinet Fortisiem
CVE-2024-46667Same product: Fortinet Fortisiem
CVE-2019-17659Same product: Fortinet Fortisiem
CVE-2026-39815Same vendor: Fortinet
CVE-2024-21760Same vendor: Fortinet
CVE-2024-55597Same vendor: Fortinet
CVE-2024-52960Same vendor: Fortinet
CVE-2026-40688Same vendor: Fortinet
CVE-2023-33302Same vendor: Fortinet

References