First published: Tue Oct 10 2023(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLM | >=8.5.0<=8.5.4 | |
Fortinet FortiWLM | >=8.6.0<=8.6.5 |
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36550 is a vulnerability known as 'improper neutralization of special elements used in an os command injection' in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4.
The severity of CVE-2023-36550 is critical with a CVSS score of 9.8.
CVE-2023-36550 affects Fortinet FortiWLM versions 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4.
An attacker can exploit CVE-2023-36550 by executing unauthorized code or commands via specifically crafted HTTP GET request parameters.
It is recommended to update Fortinet FortiWLM to a version that is not affected by CVE-2023-36550. Please refer to the vendor's security advisory for more information.