First published: Tue Jan 14 2025(Updated: )
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiMail versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.6 and 6.4.0 through 6.4.7, FortiRecorder versions 7.0.0 and 6.4.0 through 6.4.4 allows attacker to execute unauthorized code or commands via the CLI.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | >=7.2.0<=7.2.4>=7.0.0<=7.0.6>=6.4.0<=6.4.7 | |
Fortinet FortiRecorder | >=6.4.0<6.4.4 | |
Fortinet FortiMail | >=6.4.0<6.4.8 | |
Fortinet FortiMail | >=7.0.0<7.0.7 | |
Fortinet FortiMail | >=7.2.0<7.2.5 | |
Fortinet FortiRecorder | >=6.4.0<6.4.5 | |
Fortinet FortiRecorder | >=7.0.0<7.0.2 |
Please upgrade to FortiMail version 7.4.0 or above Please upgrade to FortiMail version 7.2.5 or above Please upgrade to FortiMail version 7.0.7 or above Please upgrade to FortiMail version 6.4.8 or above Please upgrade to FortiRecorder version 7.2.0 or above Please upgrade to FortiRecorder version 7.0.2 or above Please upgrade to FortiRecorder version 6.4.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56497 is classified as a high-severity vulnerability due to its potential for unauthorized code execution.
To fix CVE-2024-56497, update FortiMail and FortiRecorder to their respective versions that are higher than 7.2.4, 7.0.6, and 6.4.7 for FortiMail or 6.4.4 for FortiRecorder.
CVE-2024-56497 affects Fortinet FortiMail versions 7.2.0 to 7.2.4, 7.0.0 to 7.0.6, and 6.4.0 to 6.4.7, along with FortiRecorder versions 7.0.0 and 6.4.0 to 6.4.4.
Yes, CVE-2024-56497 can potentially lead to data breaches as it allows attackers to execute arbitrary commands on affected systems.
CVE-2024-56497 is a type of OS command injection vulnerability resulting from improper neutralization of special elements.