First published: Tue May 14 2024(Updated: )
A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | <7.0.12 | |
Fortinet FortiProxy | >7.2.0<7.2.6 | |
Fortinet FortiSwitchManager | >=7.0.0<7.0.3 | |
Fortinet FortiSwitchManager | >=7.2.0<7.2.3 | |
Fortinet FortiOS IPS Engine | <7.2.6 | |
Fortinet FortiOS IPS Engine | >=6.2.0<=6.2.16 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.15 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | =7.4.0 | |
FortiGuard FortiPAM | >=1.0.0<=1.0.3 | |
FortiGuard FortiPAM | =1.1.0 | |
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiOS IPS Engine | >=6.0.0<=6.0.16 | |
FortiGuard FortiPAM | =. | |
FortiGuard FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.2.0<=7.2.5 | |
Fortinet FortiProxy | >=7.0.0<=7.0.11 | |
Fortinet FortiProxy | >=2.0 | |
Fortinet FortiProxy | >=1.2 | |
Fortinet FortiProxy | >=1.1 | |
Fortinet FortiProxy | >=1.0 | |
Fortinet FortiSwitchManager | >=7.2.0<=7.2.2 | |
Fortinet FortiSwitchManager | >=7.0.0<=7.0.2 |
Please upgrade to FortiOS version 7.4.1 or above Please upgrade to FortiOS version 7.2.6 or above Please upgrade to FortiSwitchManager version 7.2.3 or above Please upgrade to FortiSwitchManager version 7.0.3 or above Please upgrade to FortiProxy version 7.2.6 or above Please upgrade to FortiProxy version 7.0.12 or above Please upgrade to FortiPAM version 1.1.1 or above Please upgrade to FortiSASE version 22.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45583 is classified as high, due to its potential to allow remote code execution via a format string vulnerability.
To fix CVE-2023-45583, upgrade Fortinet FortiOS to version 7.4.1 or higher, or FortiProxy to version 7.2.6 or higher.
CVE-2023-45583 affects FortiOS versions including 7.2.0 through 7.2.5, as well as various versions of FortiProxy and FortiPAM.
Currently, there are no recommended workarounds for CVE-2023-45583, so timely upgrading is essential.
CVE-2023-45583 impacts multiple FortiNet products, including FortiOS, FortiProxy, and FortiPAM.