First published: Tue Mar 12 2024(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiManager, FortiAnalyzer, FortiAnalyzer-BigData & FortiPortal may allow a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.2.0<7.0.10 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.4 | |
Fortinet FortiAnalyzer | >=7.4.0<7.4.2 | |
Fortinet Fortianalyzer Bigdata | >=6.4.5<=6.4.7 | |
Fortinet Fortianalyzer Bigdata | >=7.0.1<=7.0.6 | |
Fortinet Fortianalyzer Bigdata | >=7.2.0<7.2.6 | |
Fortinet Fortianalyzer Bigdata | =6.2.5 | |
Fortinet FortiManager | >=6.2.0<7.0.10 | |
Fortinet FortiManager | >=7.2.0<7.2.4 | |
Fortinet FortiManager | >=7.4.0<7.4.2 | |
Fortinet FortiPortal | >=5.3.0<=6.0.14 |
Please upgrade to FortiManager version 7.4.2 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.10 or above Please upgrade to FortiAnalyzer version 7.4.2 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.10 or above Please upgrade to FortiAnalyzer-BigData version 7.4.0 or above Please upgrade to FortiAnalyzer-BigData version 7.2.6 or above Please upgrade to FortiPortal version 7.0.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.