First published: Tue Jul 05 2022(Updated: )
A buffer copy without checking size of input ('Classic Buffer Overflow')Â vulnerability [CWE-120] in FortiAnalyzer, FortiManager, FortiOS and FortiProxy may allow a privileged attacker to execute arbitrary code or command via crafted CLI `execute certificate remote`, `execute vpn certificate remote` and `execute restore image` operations with the TFTP protocol.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | ||
Fortinet FortiManager | ||
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-21-206 is considered critical due to the potential for arbitrary code execution.
To fix FG-IR-21-206, apply the latest security patches provided by Fortinet for FortiAnalyzer, FortiManager, FortiOS, and FortiProxy.
FG-IR-21-206 affects FortiAnalyzer, FortiManager, FortiOS, and FortiProxy without specific version limitations.
FG-IR-21-206 is classified as a classic buffer overflow vulnerability, specifically CWE-120.
An attacker exploiting FG-IR-21-206 can execute arbitrary code or commands via crafted CLI inputs.