A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted command.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-119 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-119 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
10 Dec 2024, 19:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-119 - Vendor Advisory | |
CPE | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
First Time |
Fortinet fortipam
Fortinet fortios Fortinet Fortinet fortiproxy |
Information
Published : 2024-02-22 10:15
Updated : 2024-12-10 19:07
NVD link : CVE-2023-29181
Mitre link : CVE-2023-29181
CVE.ORG link : CVE-2023-29181
JSON object : View
Products Affected
fortinet
- fortiproxy
- fortipam
- fortios
CWE
CWE-134
Use of Externally-Controlled Format String