First published: Tue Jun 13 2023(Updated: )
Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] in Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=5.2.0<=5.2.8 | |
Fortinet FortiADC | >=5.3.0<=5.3.7 | |
Fortinet FortiADC | >=5.4.0<=5.4.5 | |
Fortinet FortiADC | >=6.0.0<=6.0.4 | |
Fortinet FortiADC | >=6.1.0<=6.1.6 | |
Fortinet FortiADC | >=6.2.0<=6.2.6 | |
Fortinet FortiADC | >=7.0.0<=7.0.5 | |
Fortinet FortiADC | =7.1.0 | |
Fortinet FortiADC | =7.1.1 | |
Fortinet FortiADC | =7.1.2 | |
Fortinet FortiADC | =7.2.0 | |
Fortinet Fortiadc Manager | =5.2.0 | |
Fortinet Fortiadc Manager | =5.2.1 | |
Fortinet Fortiadc Manager | =5.3.0 | |
Fortinet Fortiadc Manager | =5.4.0 | |
Fortinet Fortiadc Manager | =6.0.0 | |
Fortinet Fortiadc Manager | =6.1.0 | |
Fortinet Fortiadc Manager | =6.2.0 | |
Fortinet Fortiadc Manager | =6.2.1 | |
Fortinet Fortiadc Manager | =7.0.0 | |
Fortinet Fortiadc Manager | =7.1.0 |
Please upgrade to FortiADC version 7.2.1 or above Please upgrade to FortiADC version 7.1.3 or above Please upgrade to FortiADCManager version 7.2.0 or above Please upgrade to FortiADCManager version 7.1.1 or above Please upgrade to FortiADCManager version 7.0.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-26210.
The severity level of CVE-2023-26210 is high with a CVSS score of 7.8.
Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 are affected by CVE-2023-26210.
The CWE ID associated with CVE-2023-26210 is CWE-78.
To fix the CVE-2023-26210 vulnerability, it is recommended to update Fortinet FortiADCManager and FortiADC to versions that are not affected by the vulnerability.