First published: Tue Nov 12 2024(Updated: )
A heap-based buffer overflow in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to escalation of privilege via specially crafted http requests
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.2 | |
Fortinet FortiAnalyzer Cloud | >=7.2.1<=7.2.6 | |
Fortinet FortiAnalyzer Cloud | >=7.0 | |
Fortinet FortiAnalyzer Cloud | >=6.4 | |
Fortinet FortiManager Cloud | >=7.0 | |
Fortinet FortiManager Cloud | >=6.4 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.4.1<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.2.1<=7.2.6 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 | |
Fortinet FortiManager | >=6.0 | |
Fortinet FortiAnalyzer | >=6.4.0<7.2.6 | |
Fortinet FortiAnalyzer | >=7.4.0<7.4.3 | |
Fortinet FortiManager | >=6.0.0<7.2.7 | |
Fortinet FortiManager | >=7.4.0<7.4.3 | |
Fortinet FortiManager Cloud | >=6.4.1<7.2.7 | |
Fortinet FortiManager Cloud | >=7.4.1<7.4.3 |
Please upgrade to FortiAnalyzer version 7.4.3 or above Please upgrade to FortiAnalyzer version 7.2.6 or above Please upgrade to FortiManager version 7.4.3 or above Please upgrade to FortiManager version 7.2.6 or above Please upgrade to FortiAP-U version 7.0.4 or above Please upgrade to FortiClient (all) version 7.4.0 or above Please upgrade to FortiClient (all) version 7.2.5 or above Please upgrade to FortiClient (all) version 7.0.13 or above Please upgrade to FortiManager Cloud version 7.4.3 or above Please upgrade to FortiManager Cloud version 7.2.7 or above Please upgrade to FortiAP version 7.6.0 or above Please upgrade to FortiAP version 7.4.3 or above Please upgrade to FortiClientEMS version 7.2.7 or above Please upgrade to FortiAnalyzer Cloud version 7.4.3 or above Please upgrade to FortiAnalyzer Cloud version 7.2.7 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-33505 is classified as critical due to the potential for remote code execution and escalation of privileges.
To fix CVE-2024-33505, upgrade Fortinet FortiAnalyzer and FortiManager to versions 7.4.3 or later, or 7.2.6 or later depending on your current version.
CVE-2024-33505 affects FortiAnalyzer versions 7.4.0 to 7.4.2, 7.2.0 to 7.2.5, 7.0.0 to 7.0.12, and all 6.4.x versions.
Yes, FortiManager versions 7.4.0 to 7.4.2, 7.2.0 to 7.2.5, 7.0.0 to 7.0.12, and all 6.4.x versions are affected.
Yes, FortiAnalyzer Cloud versions 7.4.1 to 7.4.2 and 7.2.1 to 7.2.6 are impacted by CVE-2024-33505.