A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted command.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-119 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-119 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
10 Dec 2024, 19:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Fortinet fortipam
Fortinet Fortinet fortios Fortinet fortiproxy |
|
References | () https://fortiguard.com/psirt/FG-IR-23-119 - Vendor Advisory | |
CWE | ||
CPE | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:* |
22 Feb 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-22 10:15
Updated : 2024-12-10 19:07
NVD link : CVE-2023-29181
Mitre link : CVE-2023-29181
JSON object : View
Products Affected
fortinet
- fortiproxy
- fortipam
- fortios
CWE
No CWE.