First published: Tue Mar 12 2024(Updated: )
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
fortinet FortiClient endpoint management server | ||
Fortinet FortiClient | >=7.2.0<=7.2.2 | |
Fortinet FortiClient | >=7.0.1<=7.0.10 | |
Fortinet FortiClient EMS Cloud | >=7.0.1<7.0.11 | |
Fortinet FortiClient EMS Cloud | >=7.2.0<7.2.3 |
Please upgrade to FortiClientEMS version 7.2.3 or above Please upgrade to FortiClientEMS version 7.0.11 or above
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-48788 is considered a critical vulnerability due to its potential to allow unauthorized code execution.
To mitigate CVE-2023-48788, update your FortiClient EMS to version 7.2.3 or 7.0.11 or later.
CVE-2023-48788 affects FortiClient EMS versions 7.2.0 through 7.2.2 and 7.0.1 through 7.0.10.
CVE-2023-48788 is classified as an SQL injection vulnerability.
An attacker can execute unauthorized code or commands on affected FortiClient EMS instances by exploiting CVE-2023-48788.