First published: Tue Nov 12 2024(Updated: )
An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS and FortiProxy SSL-VPN web user interface may allow a remote unauthenticated attacker to perform phishing attempts via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<7.0.17 | |
Fortinet FortiProxy | >=7.2.0<7.2.10 | |
Fortinet FortiProxy | >=7.4.0<7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.0.0<7.2.9 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiProxy | >=7.4.0<=7.4.3 | |
Fortinet FortiProxy | >=7.2.0<=7.2.9 | |
Fortinet FortiProxy | >=7.0.0<=7.0.16 |
Please upgrade to FortiOS version 7.6.0 or above Please upgrade to FortiProxy version 7.4.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33510 has a high severity rating due to its potential for remote exploitation and phishing attacks.
To fix CVE-2024-33510, upgrade FortiOS to version 7.4.4, 7.2.9, or higher as specified in the advisory.
CVE-2024-33510 affects Fortinet's FortiOS and FortiProxy products, specifically within certain version ranges.
Yes, CVE-2024-33510 can be exploited remotely by unauthenticated attackers via specially crafted requests.
CVE-2024-33510 is classified as an improper neutralization of special elements in output, leading to injection vulnerabilities.