{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T08:39:15.676","vulnerabilities":[{"cve":{"id":"CVE-2024-46667","sourceIdentifier":"psirt@fortinet.com","published":"2025-01-14T14:15:31.797","lastModified":"2025-07-16T13:16:19.890","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections."},{"lang":"es","value":"Una asignación de recursos sin límites ni limitación en Fortinet FortiSIEM 5.3 todas las versiones, 5.4 todas las versiones, 6.x todas las versiones, 7.0 todas las versiones y 7.1.0 a 7.1.5 puede permitir que un atacante deniegue tráfico TLS válido mediante el consumo de todas las conexiones asignadas."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3.0","versionEndIncluding":"5.3.3","matchCriteriaId":"A0258A88-352D-4F9A-894D-F7442CAFE461"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.0","versionEndIncluding":"6.1.2","matchCriteriaId":"24480037-F5CE-4CCE-800D-8C707B7F36AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndIncluding":"6.2.1","matchCriteriaId":"3345EC56-9176-4463-A0B0-88267618383E"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"6.3.0","versionEndIncluding":"6.3.3","matchCriteriaId":"D9FC4C46-F269-4635-80BE-BED292538FEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndIncluding":"6.4.4","matchCriteriaId":"0320CE9C-6A73-44B9-90F5-B166E39D4EF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.0","versionEndIncluding":"6.5.3","matchCriteriaId":"95BF2F4C-084C-4BA7-9135-C970504E5682"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.0","versionEndIncluding":"6.6.5","matchCriteriaId":"9BEF7191-7173-42FE-BEEE-0D956B1DCEE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.0","versionEndIncluding":"6.7.9","matchCriteriaId":"E3BD3264-378E-407A-A964-68A5F5BF9C91"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndIncluding":"7.0.3","matchCriteriaId":"3E588953-625A-477F-832C-D18C34A6BC66"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.0","versionEndExcluding":"7.1.6","matchCriteriaId":"18D56E3E-931D-45D0-A7F9-F039DB99AA8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortisiem:5.4.0:*:*:*:*:*:*:*","matchCriteriaId":"91E43A1B-D4C5-4FFF-9D3E-00140023921E"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-24-164","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}