First published: Mon Feb 05 2024(Updated: )
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via crafted API requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSIEM | >=6.4.0<=6.4.2 | |
Fortinet FortiSIEM | >=6.5.0<=6.5.2 | |
Fortinet FortiSIEM | >=6.6.0<=6.6.3 | |
Fortinet FortiSIEM | >=6.7.0<=6.7.8 | |
Fortinet FortiSIEM | >=7.0.0<=7.0.2 | |
Fortinet FortiSIEM | =7.1.0 | |
Fortinet FortiSIEM | =7.1.1 | |
Fortinet FortiOS | ||
Fortinet FortiProxy |
Please upgrade to FortiSIEM version 7.1.2 or above Please upgrade to upcoming FortiSIEM version 7.2.0 or above Please upgrade to upcoming FortiSIEM version 7.0.3 or above Please upgrade to upcoming FortiSIEM version 6.7.9 or above Please upgrade to upcoming FortiSIEM version 6.6.5 or above Please upgrade to upcoming FortiSIEM version 6.5.3 or above Please upgrade to upcoming FortiSIEM version 6.4.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)