First published: Tue Feb 01 2022(Updated: )
An improper neutralization of special elements used in a command vulnerability ('Command Injection') [CWE-77] in FortiExtender may allow an authenticated user to raise its privileges to admin user via crafted arguments of the execute CLI command.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiExtender Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-21-148 is high due to its potential to allow privilege escalation for authenticated users.
To fix FG-IR-21-148, it is recommended to update FortiExtender to the latest firmware version provided by Fortinet.
All authenticated users of FortiExtender are potentially affected by FG-IR-21-148.
FG-IR-21-148 is classified as a command injection vulnerability.
FG-IR-21-148 can allow an authenticated attacker to escalate their privileges to that of an admin user.