First published: Mon Feb 05 2024(Updated: )
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy | ||
Fortinet FortiSIEM Windows Agent | >=6.4.0<=6.4.2 | |
Fortinet FortiSIEM Windows Agent | >=6.5.0<=6.5.2 | |
Fortinet FortiSIEM Windows Agent | >=6.6.0<=6.6.3 | |
Fortinet FortiSIEM Windows Agent | >=6.7.0<=6.7.8 | |
Fortinet FortiSIEM Windows Agent | >=7.0.0<=7.0.2 | |
Fortinet FortiSIEM Windows Agent | =7.1.0 | |
Fortinet FortiSIEM Windows Agent | =7.1.1 |
Please upgrade to FortiSIEM version 7.1.2 or above Please upgrade to upcoming FortiSIEM version 7.2.0 or above Please upgrade to upcoming FortiSIEM version 7.0.3 or above Please upgrade to upcoming FortiSIEM version 6.7.9 or above Please upgrade to upcoming FortiSIEM version 6.6.5 or above Please upgrade to upcoming FortiSIEM version 6.5.3 or above Please upgrade to upcoming FortiSIEM version 6.4.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-23109 is considered to have a critical severity level due to its potential for remote code execution.
To fix CVE-2024-23109, it is recommended to upgrade FortiSIEM to versions 7.1.2 or higher, 7.0.3 or higher, 6.8.0 or higher, or apply the necessary patches provided by Fortinet.
CVE-2024-23109 affects FortiSIEM versions 6.4.0 through 7.1.1.
CVE-2024-23109 is classified as an OS command injection vulnerability.
Yes, CVE-2024-23109 can potentially lead to unauthorized access and data breaches if exploited.