First published: Thu Feb 16 2023(Updated: )
A stack-based buffer overflow in Fortinet FortiWeb 6.4 all versions, FortiWeb versions 6.3.17 and earlier, FortiWeb versions 6.2.6 and earlier, FortiWeb versions 6.1.2 and earlier, FortiWeb versions 6.0.7 and earlier, FortiWeb versions 5.9.1 and earlier, FortiWeb 5.8 all versions, FortiWeb 5.7 all versions, FortiWeb 5.6 all versions allows attacker to execute unauthorized code or commands via specially crafted command arguments.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=5.6.0<5.9.2 | |
Fortinet FortiWeb | >=6.0.0<6.0.8 | |
Fortinet FortiWeb | >=6.1.0<6.1.3 | |
Fortinet FortiWeb | >=6.2.0<6.2.7 | |
Fortinet FortiWeb | >=6.3.0<6.3.18 | |
Fortinet FortiWeb | >=6.4.0<=6.4.2 |
Please upgrade to FortiWeb version 7.0.0 or above Please upgrade to FortiWeb version 6.3.18 or above Please upgrade to FortiWeb version 6.2.7 or above Please upgrade to FortiWeb version 6.1.3 or above Please upgrade to FortiWeb version 6.0.8 or above Please upgrade to FortiWeb version 5.9.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25602 is a stack-based buffer overflow vulnerability in Fortinet FortiWeb.
CVE-2023-25602 affects FortiWeb versions 6.4.0 to 6.4.2, 6.3.0 to 6.3.18, 6.2.0 to 6.2.7, 6.1.0 to 6.1.3, 6.0.0 to 6.0.8, and 5.6.0 to 5.9.2.
The severity of CVE-2023-25602 is rated as high, with a CVSS score of 7.8.
CVE-2023-25602 can lead to a stack-based buffer overflow, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service.
Yes, Fortinet has released patches to address the CVE-2023-25602 vulnerability. It is recommended to update to the latest patched version of FortiWeb.