First published: Tue Mar 12 2024(Updated: )
A improper neutralization of formula elements in a csv file in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, 7.0.0 through 7.0.10, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8 allows attacker to execute unauthorized code or commands via specially crafted packets.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient | >=6.0.0<=6.0.8 | |
Fortinet FortiClient | >=6.2.0<=6.2.9 | |
Fortinet FortiClient | >=6.4.0<=6.4.9 | |
Fortinet FortiClient | >=7.0.0<=7.0.10 | |
Fortinet FortiClient | >=7.2.0<=7.2.2 |
Please upgrade to FortiClientEMS version 7.2.3 or above Please upgrade to FortiClientEMS version 7.0.11 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-47534 has been classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2023-47534, upgrade Fortinet FortiClientEMS to version 7.2.3 or later.
CVE-2023-47534 affects FortiClientEMS versions 6.0.0 to 6.0.8, 6.2.0 to 6.2.9, 6.4.0 to 6.4.9, 7.0.0 to 7.0.10, and 7.2.0 to 7.2.2.
CVE-2023-47534 poses a risk of unauthorized code execution through specially crafted packets.
Currently, the recommended mitigation for CVE-2023-47534 is to update to a fixed version as there is no official workaround available.