First published: Tue Jan 14 2025(Updated: )
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiVoice version 7.0.0 through 7.0.4 and before 6.4.9 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiVoice | >=7.0.0<=7.0.4<6.4.9 | |
Fortinet FortiVoice | >=6.0.0<6.4.10 | |
Fortinet FortiVoice | >=7.0.0<7.0.5 |
Please upgrade to FortiVoice version 7.2.0 or above Please upgrade to FortiVoice version 7.0.5 or above Please upgrade to FortiVoice version 6.4.10 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40587 is considered a critical vulnerability due to its potential for unauthorized code execution.
To fix CVE-2024-40587, FortiVoice users should update to version 7.0.5 or later, or 6.4.10 or later.
CVE-2024-40587 affects Fortinet FortiVoice versions 7.0.0 through 7.0.4 and all versions before 6.4.9.
CVE-2024-40587 can be exploited by authenticated privileged attackers who send crafted CLI requests.
CVE-2024-40587 is an OS Command Injection vulnerability that improperly neutralizes special OS command elements.