First published: Tue Jan 14 2025(Updated: )
A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker to execute unauthorized code or commands via specially crafted packets.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.3>=7.2.0<=7.2.5>=7.0.0<=7.0.12>=6.4.0<=6.4.14 | |
Fortinet FortiManager | >=7.4.0<=7.4.3>=7.2.0<=7.2.5>=7.0.0<=7.0.12>=6.4.0<=6.4.14 | |
Fortinet FortiManager Cloud | >=7.4.1<7.4.3>=7.2.1<=7.2.5>=7.0.1<7.0.11>=6.4.1<6.4.7 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<7.4.3>=7.2.1<=7.2.5>=7.0.1<7.0.11>=6.4.1<6.4.7 | |
Fortinet FortiAnalyzer | >=6.4.0<6.4.15 | |
Fortinet FortiAnalyzer | >=7.0.0<7.0.13 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.6 | |
Fortinet FortiAnalyzer | >=7.4.0<7.4.4 | |
Fortinet FortiAnalyzer Cloud | >=6.4.1<7.0.12 | |
Fortinet FortiAnalyzer Cloud | >=7.2.1<7.2.6 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<7.4.4 | |
Fortinet FortiManager | >=6.4.0<6.4.15 | |
Fortinet FortiManager | >=7.0.0<7.0.13 | |
Fortinet FortiManager | >=7.2.0<7.2.6 | |
Fortinet FortiManager | >=7.4.0<7.4.4 | |
Fortinet FortiManager Cloud | >=6.4.1<7.0.12 | |
Fortinet FortiManager Cloud | >=7.2.1<7.2.6 | |
Fortinet FortiManager Cloud | >=7.4.1<7.4.4 |
Please upgrade to FortiAnalyzer version 7.6.0 or above Please upgrade to FortiAnalyzer version 7.4.4 or above Please upgrade to FortiAnalyzer version 7.2.6 or above Please upgrade to FortiAnalyzer version 7.0.13 or above Please upgrade to FortiAnalyzer version 6.4.15 or above Please upgrade to FortiManager Cloud version 7.4.4 or above Please upgrade to FortiManager Cloud version 7.2.6 or above Please upgrade to FortiManager Cloud version 7.0.12 or above Please upgrade to FortiAnalyzer Cloud version 7.4.4 or above Please upgrade to FortiAnalyzer Cloud version 7.2.6 or above Please upgrade to FortiAnalyzer Cloud version 7.0.12 or above Please upgrade to FortiPortal version 6.0.16 or above Please upgrade to FortiManager version 7.6.0 or above Please upgrade to FortiManager version 7.4.4 or above Please upgrade to FortiManager version 7.2.6 or above Please upgrade to FortiManager version 7.0.13 or above Please upgrade to FortiManager version 6.4.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35276 has a critical severity level due to the potential for remote code execution from a stack-based buffer overflow.
To mitigate CVE-2024-35276, upgrade Fortinet FortiAnalyzer, FortiManager, and their corresponding cloud services to the latest patched versions.
CVE-2024-35276 affects multiple versions across FortiAnalyzer and FortiManager, primarily those from 6.4.0 up to 7.4.3.
CVE-2024-35276 impacts Fortinet products including FortiAnalyzer, FortiManager, FortiManager Cloud, and FortiAnalyzer Cloud.
Yes, successful exploitation of CVE-2024-35276 could potentially lead to data loss as it allows remote code execution.