First published: Thu Jun 03 2021(Updated: )
An improper input validation in FortiAI v1.4.0 and earlier may allow an authenticated user to gain system shell access via a malicious payload in the "diagnose" command.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiai Firmware | <=1.4.0 | |
Fortinet Fortiai 3500f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-24023 is classified as high due to the potential for an authenticated user to gain unauthorized system shell access.
To fix CVE-2021-24023, upgrade FortiAI to version 1.4.1 or later, which addresses the improper input validation vulnerability.
CVE-2021-24023 affects FortiAI versions 1.4.0 and earlier, including specific hardware models like the FortiAI 3500F.
CVE-2021-24023 can be exploited by an authenticated user sending a malicious payload through the 'diagnose' command.
There are no specific workarounds documented for CVE-2021-24023, so applying the update is the recommended course of action.