First published: Wed Sep 13 2023(Updated: )
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiTester 3.0.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortitester | >=3.0.0<=7.2.3 |
Please upgrade to FortiTester version 7.3.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-36642.
The severity of CVE-2023-36642 is high (7.8).
The affected software for CVE-2023-36642 is FortiTester version 3.0.0 through 7.2.3.
CVE-2023-36642 exploits an improper neutralization of special elements used in an OS command vulnerability in the management interface of FortiTester, allowing an authenticated attacker to execute unauthorized commands.
Yes, it is recommended to upgrade FortiTester to a version beyond 7.2.3 as a fix for CVE-2023-36642.