First published: Tue Oct 10 2023(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLM | >=8.5.0<=8.5.4 | |
Fortinet FortiWLM | >=8.6.0<=8.6.5 |
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34986 refers to an os command injection vulnerability in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4.
CVE-2023-34986 allows attackers to execute unauthorized code or commands via specially crafted HTTP get request parameters.
The severity of CVE-2023-34986 is high with a severity value of 8.8.
To fix CVE-2023-34986, it is recommended to update Fortinet FortiWLM to versions 8.6.6 or 8.5.5 (or later) where the vulnerability is patched.
You can find more information about CVE-2023-34986 at the following link: [CVE-2023-34986](https://fortiguard.com/psirt/FG-IR-23-141).