First published: Tue Mar 12 2024(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiManager, FortiAnalyzer, FortiAnalyzer-BigData & FortiPortal may allow a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.2.0<7.0.10 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.4 | |
Fortinet FortiAnalyzer | >=7.4.0<7.4.2 | |
Fortinet FortiAnalyzer | >=6.4.5<=6.4.7 | |
Fortinet FortiAnalyzer | >=7.0.1<=7.0.6 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.6 | |
Fortinet FortiAnalyzer | =6.2.5 | |
Fortinet FortiManager | >=6.2.0<7.0.10 | |
Fortinet FortiManager | >=7.2.0<7.2.4 | |
Fortinet FortiManager | >=7.4.0<7.4.2 | |
Fortinet FortiPortal | >=5.3.0<=6.0.14 |
Please upgrade to FortiManager version 7.4.2 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.10 or above Please upgrade to FortiAnalyzer version 7.4.2 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.10 or above Please upgrade to FortiAnalyzer-BigData version 7.4.0 or above Please upgrade to FortiAnalyzer-BigData version 7.2.6 or above Please upgrade to FortiPortal version 7.0.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41842 has been classified as a critical vulnerability due to its potential to allow privileged attackers to execute unauthorized code.
To fix CVE-2023-41842, update your FortiManager, FortiAnalyzer, or FortiPortal to the latest patched version as specified by Fortinet.
CVE-2023-41842 affects FortiManager, FortiAnalyzer, and FortiPortal across various versions.
Yes, CVE-2023-41842 can be exploited remotely by an attacker leveraging specially crafted command arguments.
CVE-2023-41842 is categorized as a use of externally-controlled format string vulnerability, which can lead to code execution.