First published: Tue Jan 14 2025(Updated: )
A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSwitch | =. | |
Fortinet FortiSwitch | >=7.2.0<=7.2.5 | |
Fortinet FortiSwitch | >=7.0.0<=7.0.7 | |
Fortinet FortiSwitch | >=6.4.0<=6.4.13 | |
Fortinet FortiSwitch | >=6.2.0<=6.2.7 | |
Fortinet FortiSwitch | >=6.0.0<=6.0.7 |
Please upgrade to FortiSwitch version 7.4.1 or above Please upgrade to FortiSwitch version 7.2.6 or above Please upgrade to FortiSwitch version 7.0.8 or above Please upgrade to FortiSwitch version 6.4.14 or above Please upgrade to FortiSwitch version 6.2.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.