Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36556: Escalation of privilege in Fortinet FortiMail

0
High
VulnerabilityCVE-2023-36556cvecve-2023-36556
Published: Tue Oct 10 2023 (10/10/2023, 16:49:50 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiMail

Description

CVE-2023-36556 is a high-severity escalation of privilege vulnerability in Fortinet FortiMail webmail versions 6. 0. 0 through 7. 2. 2. It allows an authenticated attacker to access other users' accounts within the same web domain by exploiting incorrect authorization via crafted HTTP/HTTPS requests. The vulnerability does not require user interaction but does require the attacker to have valid credentials. Exploitation can lead to full compromise of confidentiality, integrity, and availability of email communications. No public exploits are currently known. European organizations using affected FortiMail versions are at risk, especially those with large deployments of Fortinet products.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:29:34 UTC

Technical Analysis

CVE-2023-36556 is an authorization bypass vulnerability classified under CWE-863 affecting Fortinet FortiMail webmail versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.5, and versions below 6.4.7. The flaw arises from incorrect authorization checks in the webmail interface, allowing an authenticated attacker to impersonate other users within the same web domain by sending specially crafted HTTP or HTTPS requests. This vulnerability enables attackers with valid credentials to escalate privileges and access other users' mailboxes without proper authorization. The vulnerability impacts confidentiality, integrity, and availability since unauthorized access to email accounts can lead to data leakage, manipulation of emails, and disruption of mail services. The CVSS v3.1 base score is 8.6 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact make this a critical issue for organizations relying on FortiMail for secure email gateway services. FortiMail is widely used in enterprise environments for email security, making this vulnerability a significant risk if left unpatched.

Potential Impact

For European organizations, the impact of CVE-2023-36556 can be severe. Unauthorized access to email accounts can lead to exposure of sensitive communications, intellectual property theft, and regulatory non-compliance, especially under GDPR requirements for data protection. Attackers could manipulate or delete emails, disrupt business communications, or use compromised accounts to launch further attacks such as phishing or lateral movement within networks. Organizations in sectors like finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitive nature of their communications. The breach of confidentiality and integrity of email data can result in financial losses, reputational damage, and legal penalties. Additionally, since FortiMail is often deployed as a perimeter defense, compromise here could undermine overall network security posture.

Mitigation Recommendations

1. Immediately upgrade FortiMail to the latest patched versions beyond 7.2.2, 7.0.5, or 6.4.7 as provided by Fortinet once available. 2. Until patches are applied, restrict access to the FortiMail webmail interface to trusted networks or VPNs to reduce exposure. 3. Implement strong multi-factor authentication (MFA) for all FortiMail users to reduce risk from compromised credentials. 4. Monitor FortiMail logs for unusual access patterns or multiple account access attempts from single authenticated sessions. 5. Conduct regular audits of user permissions and session management configurations to ensure proper authorization controls. 6. Employ network-level protections such as web application firewalls (WAFs) with custom rules to detect and block suspicious crafted HTTP/HTTPS requests targeting FortiMail. 7. Educate users about credential security and phishing risks to prevent initial account compromise. 8. Coordinate with Fortinet support for any available workarounds or mitigations until official patches are deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2023-06-23T14:57:30.033Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694194799050fe8508060d0c

Added to database: 12/16/2025, 5:18:49 PM

Last enriched: 12/23/2025, 6:29:34 PM

Last updated: 2/5/2026, 10:24:46 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats