First published: Tue Jun 11 2024(Updated: )
A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=6.0.13<=6.0.18 | |
Fortinet FortiOS IPS Engine | >=6.2.9<=6.2.16 | |
Fortinet FortiOS IPS Engine | >=6.4.6<=6.4.15 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=7.2.0<7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.15 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiOS IPS Engine | >=6.0 |
Please upgrade to FortiOS version 7.4.4 or above Please upgrade to FortiOS version 7.2.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46720 is considered a critical vulnerability due to its potential for unauthorized code execution.
To fix CVE-2023-46720, update FortiOS to version 7.4.4, 7.2.8, or 7.0.16, depending on your current version.
FortiOS versions 7.4.0 through 7.4.1, 7.2.0 through 7.2.7, 7.0.0 through 7.0.12, and several 6.x versions are affected.
CVE-2023-46720 is a stack-based buffer overflow vulnerability.
Yes, CVE-2023-46720 allows an attacker to execute unauthorized code or commands remotely.