First published: Thu Feb 22 2024(Updated: )
A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted command.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=1.0.0<2.0.13 | |
Fortinet FortiProxy | >=7.0.0<7.0.11 | |
Fortinet FortiProxy | >=7.2.0<7.2.5 | |
Fortinet FortiOS | >=6.0.0<6.2.15 | |
Fortinet FortiOS | >=6.4.0<6.4.13 | |
Fortinet FortiOS | >=7.0.0<7.0.12 | |
Fortinet FortiOS | >=7.2.0<7.2.5 | |
Fortinet FortiPAM | >=1.0.0<1.1.0 |
Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.12 or above Please upgrade to FortiOS version 6.4.13 or above Please upgrade to FortiOS version 6.2.15 or above Please upgrade to FortiProxy version 7.2.5 or above Please upgrade to FortiProxy version 7.0.11 or above Please upgrade to FortiProxy version 2.0.13 or above Please upgrade to FortiPAM version 1.1.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.