First published: Tue Apr 08 2025(Updated: )
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiIsolator CLI may allow a privileged attacker to execute unauthorized code or commands via crafted CLI requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiIsolator | <2.4.6 | |
Fortinet FortiIsolator | >=2.4.3<=2.4.6 |
Please upgrade to FortiIsolator version 2.4.7 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54025 is considered a high severity vulnerability due to its potential for OS command injection.
To mitigate CVE-2024-54025, upgrade Fortinet FortiIsolator to version 2.4.6 or later.
CVE-2024-54025 affects users of Fortinet FortiIsolator versions prior to 2.4.6.
CVE-2024-54025 allows a privileged attacker to execute unauthorized code or commands through crafted CLI requests.
CVE-2024-54025 involves improper neutralization of special elements used in OS commands.