First published: Tue Jun 11 2024(Updated: )
A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specially crafted packets.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=6.0.0<7.0.15 | |
Fortinet FortiOS IPS Engine | >=7.2.0<7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.4 | |
FortiGuard FortiPAM | >=1.0.0<=1.3.0 | |
Fortinet FortiProxy | >=1.0.0<7.0.17 | |
Fortinet FortiProxy | >=7.2.0<7.2.10 | |
Fortinet FortiProxy | >=7.4.0<7.4.4 | |
Fortinet FortiSwitchManager | >=7.0.1<7.0.4 | |
Fortinet FortiSwitchManager | >=7.2.0<7.2.4 |
Please upgrade to FortiPAM version 1.3.0 or above Please upgrade to FortiAuthenticator version 7.0.0 or above Please upgrade to FortiWeb version 7.6.0 or above Please upgrade to FortiWeb version 7.4.3 or above Please upgrade to FortiVoice version 7.0.2 or above Please upgrade to FortiVoice version 6.4.9 or above Please upgrade to FortiSwitchManager version 7.2.4 or above Please upgrade to FortiSwitchManager version 7.0.4 or above Please upgrade to FortiOS version 7.4.4 or above Please upgrade to FortiOS version 7.2.8 or above Please upgrade to FortiOS version 7.0.15 or above Please upgrade to FortiProxy version 7.4.4 or above Please upgrade to FortiProxy version 7.2.10 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26010 has a high severity rating due to its stack-based buffer overflow vulnerability.
To fix CVE-2024-26010, update affected Fortinet products to the latest versions as recommended by Fortinet.
CVE-2024-26010 affects FortiPAM, FortiOS, FortiWeb, FortiAuthenticator, and FortiSwitchManager across specific versions.
Yes, CVE-2024-26010 can potentially be exploited remotely to execute arbitrary code on affected systems.
CVE-2024-26010 can lead to denial-of-service attacks or unauthorized access to systems due to code execution.