First published: Mon Feb 05 2024(Updated: )
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy | ||
Fortinet FortiSIEM Windows Agent | >=6.4.0<=6.4.2 | |
Fortinet FortiSIEM Windows Agent | >=6.5.0<=6.5.2 | |
Fortinet FortiSIEM Windows Agent | >=6.6.0<=6.6.3 | |
Fortinet FortiSIEM Windows Agent | >=6.7.0<=6.7.8 | |
Fortinet FortiSIEM Windows Agent | >=7.0.0<=7.0.2 | |
Fortinet FortiSIEM Windows Agent | =7.1.0 | |
Fortinet FortiSIEM Windows Agent | =7.1.1 |
Please upgrade to FortiSIEM version 7.1.2 or above Please upgrade to upcoming FortiSIEM version 7.2.0 or above Please upgrade to upcoming FortiSIEM version 7.0.3 or above Please upgrade to upcoming FortiSIEM version 6.7.9 or above Please upgrade to upcoming FortiSIEM version 6.6.5 or above Please upgrade to upcoming FortiSIEM version 6.5.3 or above Please upgrade to upcoming FortiSIEM version 6.4.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-23108 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2024-23108, upgrade FortiSIEM to the latest version that is not affected by this vulnerability.
CVE-2024-23108 affects FortiSIEM versions 6.4.0 through 7.1.1 inclusive.
CVE-2024-23108 is an os command injection vulnerability, allowing attackers to execute unauthorized commands.
Details about specific exploits for CVE-2024-23108 have not been publicly disclosed, but the vulnerability's nature poses significant risks.