First published: Tue Apr 09 2024(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.1 and below, version 7.2.7 and below, 7.0 all versions, 6.4 all versions command line interface may allow a local privileged attacker with super-admin profile and CLI access to execute arbitrary code or commands via specially crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=7.4.0<=7.4.1 | |
FortiOS | >=7.2.0<=7.2.7 | |
FortiOS | >=7.0.0<=7.0.15 | |
FortiOS | >=6.4 | |
FortiOS | >=6.4.0<7.0.16 | |
FortiOS | >=7.2.0<7.2.8 | |
FortiOS | >=7.4.0<7.4.2 |
Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-48784 is classified as a critical vulnerability due to its potential to allow local privileged attackers to execute arbitrary code.
To remediate CVE-2023-48784, upgrade to FortiOS version 7.4.2, 7.2.8, or 7.0.16 or later.
CVE-2023-48784 affects FortiOS versions 7.4.1 and below, 7.2.7 and below, 7.0 all versions, and 6.4 all versions.
CVE-2023-48784 can be exploited by local privileged attackers who have access to the CLI with a super-admin profile.
No, CVE-2023-48784 is a local vulnerability that requires physical or privileged CLI access to exploit.