First published: Tue Dec 12 2023(Updated: )
A format string vulnerability [CWE-134] in the HTTPSd daemon of FortiOS, FortiProxy and FortiPAM may allow an authenticated user to execute unauthorized code or commands via specially crafted API requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<=7.0.10 | |
Fortinet FortiProxy | >=7.2.0<=7.2.4 | |
Fortinet FortiOS | >=6.0.0<=6.0.17 | |
Fortinet FortiOS | >=6.2.0<=6.2.15 | |
Fortinet FortiOS | >=6.4.0<=6.4.12 | |
Fortinet FortiOS | >=7.0.0<=7.0.11 | |
Fortinet FortiOS | >=7.2.0<=7.2.4 | |
Fortinet FortiOS | =7.4.0 | |
Fortinet FortiPAM | >=1.0.0<=1.0.3 | |
Fortinet FortiPAM | =1.1.0 | |
Fortinet FortiOS | =. | |
Fortinet FortiOS | >=7.2.0<=7.2.4 | |
Fortinet FortiOS | >=7.0.0<=7.0.11 | |
Fortinet FortiOS | >=6.4.0<=6.4.12 | |
Fortinet FortiOS | >=6.2.0<=6.2.15 | |
Fortinet FortiOS | >=6.0 | |
Fortinet FortiPAM | =. | |
Fortinet FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.2.0<=7.2.4 | |
Fortinet FortiProxy | >=7.0.0<=7.0.10 |
Please upgrade to FortiOS version 7.4.1 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.12 or above Please upgrade to FortiOS version 6.4.13 or above Please upgrade to FortiOS version 6.2.16 or above Please upgrade to FortiPAM version 1.2.0 or above Please upgrade to FortiPAM version 1.1.1 or above Please upgrade to FortiProxy version 7.4.0 or above Please upgrade to FortiProxy version 7.2.5 or above Please upgrade to FortiProxy version 7.0.11 or above Please upgrade to FortiSASE version 23.3 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.