First published: Tue Jan 14 2025(Updated: )
A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSwitch | =. | |
Fortinet FortiSwitch | >=7.2.0<=7.2.5 | |
Fortinet FortiSwitch | >=7.0.0<=7.0.7 | |
Fortinet FortiSwitch | >=6.4.0<=6.4.13 | |
Fortinet FortiSwitch | >=6.2.0<=6.2.7 | |
Fortinet FortiSwitch | >=6.0.0<=6.0.7 | |
Fortinet FortiSwitch | >=6.0.0<6.2.8 | |
Fortinet FortiSwitch | >=6.4.0<6.4.14 | |
Fortinet FortiSwitch | >=7.0.0<7.0.8 | |
Fortinet FortiSwitch | >=7.2.0<7.2.6 | |
Fortinet FortiSwitch | =7.4.0 |
Please upgrade to FortiSwitch version 7.4.1 or above Please upgrade to FortiSwitch version 7.2.6 or above Please upgrade to FortiSwitch version 7.0.8 or above Please upgrade to FortiSwitch version 6.4.14 or above Please upgrade to FortiSwitch version 6.2.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37936 is considered a high severity vulnerability due to the possibility of unauthorized code execution.
To fix CVE-2023-37936, upgrade Fortinet FortiSwitch to version 7.4.1 or apply the relevant patches for your version.
CVE-2023-37936 affects Fortinet FortiSwitch versions from 6.0.0 to 7.4.0.
Currently, there are no documented workarounds for CVE-2023-37936, so upgrading is the recommended action.
CVE-2023-37936 could allow attackers to execute unauthorized commands, potentially compromising the security of the entire network.