A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-260 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
31 Jan 2025, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 | |
CPE | cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiswitch:7.4.0:*:*:*:*:*:*:* |
|
Summary |
|
|
First Time |
Fortinet fortiswitch
Fortinet |
|
References | () https://fortiguard.com/psirt/FG-IR-23-260 - Vendor Advisory |
14 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 14:15
Updated : 2025-01-31 17:42
NVD link : CVE-2023-37936
Mitre link : CVE-2023-37936
CVE.ORG link : CVE-2023-37936
JSON object : View
Products Affected
fortinet
- fortiswitch