First published: Tue Mar 11 2025(Updated: )
A stack-buffer overflow vulnerability [CWE-121] in Fortinet FortiMail CLI version 7.6.0 through 7.6.1 and before 7.4.3 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail CLI | >=7.6.0<=7.6.1<7.4.3 |
Please upgrade to FortiMail version 7.6.2 or above Please upgrade to FortiMail version 7.4.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46663 has a high severity rating due to its potential to allow arbitrary code execution by a privileged attacker.
To mitigate CVE-2024-46663, upgrade Fortinet FortiMail CLI to version 7.6.2 or later, or ensure you are not using versions 7.6.0 to 7.6.1 or before 7.4.3.
CVE-2024-46663 affects Fortinet FortiMail CLI version 7.6.0 to 7.6.1 and versions prior to 7.4.3.
A stack-buffer overflow vulnerability like CVE-2024-46663 allows attackers to exploit memory allocation errors to execute arbitrary code.
CVE-2024-46663 can be exploited by a privileged attacker capable of executing specially crafted CLI commands.