First published: Mon Aug 25 2014(Updated: )
The FortiManager protocol service in Fortinet FortiOS before 4.3.16 and 5.0.0 before 5.0.8 on FortiGate devices allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | <=4.3.15 | |
Fortinet FortiOS IPS Engine | =4.3.10 | |
Fortinet FortiOS IPS Engine | =4.3.12 | |
Fortinet FortiOS IPS Engine | =4.3.13 | |
Fortinet FortiOS IPS Engine | =4.3.14 | |
Fortinet FortiOS IPS Engine | =5.0.0 | |
Fortinet FortiOS IPS Engine | =5.0.3 | |
Fortinet FortiOS IPS Engine | =5.0.4 | |
Fortinet FortiOS IPS Engine | =5.0.5 | |
Fortinet FortiOS IPS Engine | =5.0.6 | |
Fortinet FortiOS IPS Engine | =5.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2216 is classified as a critical vulnerability due to its potential for remote denial of service and arbitrary code execution.
To fix CVE-2014-2216, upgrade your FortiOS to version 4.3.16, 5.0.8, or later.
CVE-2014-2216 affects FortiOS versions prior to 4.3.16 and 5.0.0 versions before 5.0.8 on FortiGate devices.
CVE-2014-2216 allows attackers to cause a denial of service and potentially execute arbitrary code through crafted requests.
Yes, CVE-2014-2216 can be exploited remotely by attackers targeting vulnerable FortiGate devices.