First published: Thu Dec 19 2024(Updated: )
Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | <6.0.10 | |
Fortinet FortiOS IPS Engine | <5.6.12 | |
Fortinet FortiOS IPS Engine | <5.6.13 | |
Fortinet FortiOS IPS Engine | >=6.0.0<6.0.11 |
Please upgrade to FortiOS versions 5.6.13 or above. Please upgrade to FortiOS versions 6.0.11 or above. FortiOS versions 6.2.0 and above are not impacted. FortiOS versions 6.4.0 and above are not impacted. Workaround: Please ensure that Fortiheartbeat and Endpoint-Compliance are not both enabled on the same interface. FortiHeartbeat and Endpoint-Compliance can be disabled on a particular interface by following the below CLI commands: config system interface edit interface set endpoint-compliance disable (<-- Disabled by default) set fortiheartbeat disable next end
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12820 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2020-12820, upgrade FortiOS to version 6.0.11 or 5.6.13 or later.
An authenticated attacker can exploit CVE-2020-12820 to crash the FortiClient NAC daemon and could potentially execute arbitrary code.
CVE-2020-12820 affects FortiOS versions 6.0.10 and below, as well as 5.6.12 and below.
Yes, CVE-2020-12820 can be exploited by attackers authenticated to the SSL VPN.