First published: Tue Feb 11 2025(Updated: )
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiAnalyzer, FortiManager, FortiAnalyzer BigData, FortiAnalyzer Cloud and FortiManager Cloud GUI may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted HTTPS or HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.3>=7.2.0<=7.2.5>=7.0.0<=7.0.13>=6.4.0<=6.4.15>=6.2.2<=6.2.13 | |
Fortinet FortiManager | >=7.4.0<=7.4.3>=7.2.0<=7.2.5>=7.0.0<=7.0.13>=6.4.0<=6.4.15>=6.2.2<=6.2.13 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.7>=7.0.1<=7.0.6>=6.4.5<=6.4.7 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.3>=7.2.1<=7.2.5>=7.0.1<=7.0.13>=6.4.1<=6.4.7 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.3>=7.2.1<=7.2.5>=7.0.1<=7.0.13>=6.4.1<=6.4.7 | |
Fortinet FortiAnalyzer | >=7.4.0<=7.4.3 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2.2<=6.2.13 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer Cloud | >=7.2.1<=7.2.5 | |
Fortinet FortiAnalyzer Cloud | >=7.0 | |
Fortinet FortiAnalyzer Cloud | >=6.4 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.7 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.3 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2.2<=6.2.13 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiManager Cloud | >=7.2.1<=7.2.5 | |
Fortinet FortiManager Cloud | >=7.0 | |
Fortinet FortiManager Cloud | >=6.4 |
Please upgrade to FortiManager Cloud version 7.6.0 or above Please upgrade to FortiManager Cloud version 7.4.4 or above Please upgrade to FortiManager Cloud version 7.2.6 or above Please upgrade to FortiAnalyzer version 7.6.0 or above Please upgrade to FortiAnalyzer version 7.4.4 or above Please upgrade to FortiAnalyzer version 7.2.6 or above Please upgrade to FortiManager version 7.6.0 or above Please upgrade to FortiManager version 7.4.4 or above Please upgrade to FortiManager version 7.2.6 or above Please upgrade to FortiAnalyzer-BigData version 7.4.1 or above Please upgrade to FortiAnalyzer-BigData version 7.2.8 or above Please upgrade to FortiAnalyzer Cloud version 7.6.0 or above Please upgrade to FortiAnalyzer Cloud version 7.4.4 or above Please upgrade to FortiAnalyzer Cloud version 7.2.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40584 is classified as a critical severity vulnerability due to the potential for OS command injection.
To resolve CVE-2024-40584, it is recommended to upgrade FortiAnalyzer and FortiManager to the latest versions provided by Fortinet.
CVE-2024-40584 affects Fortinet FortiAnalyzer and FortiManager versions between 6.2.2 and 7.4.3.
Exploitation of CVE-2024-40584 could allow an attacker to execute arbitrary OS commands on the affected systems.
There is currently no public information indicating that CVE-2024-40584 is being actively exploited in the wild.