First published: Wed Sep 13 2023(Updated: )
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-U may allow an authenticated attacker to list and delete arbitrary files and directory via specially crafted command arguments.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAP-U | =. | |
Fortinet FortiAP-U | >=6.2.0<=6.2.5 | |
Fortinet FortiAP-U | >=6.0 | |
Fortinet FortiAP-U | >=5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-123 is classified as critical due to the potential for arbitrary file listing and deletion by authenticated attackers.
To remediate FG-IR-23-123, upgrade FortiAP-U to version 7.0.1 or later or to version 6.2.6 or later if currently on 6.2.x.
Affected versions include FortiAP-U versions prior to 7.0.1 and those from 6.2.0 to 6.2.5, as well as versions 5.4 and older.
No, the exploitation of FG-IR-23-123 requires authentication as an attacker.
FG-IR-23-123 is an incomplete filtering of special elements vulnerability, which can lead to unauthorized file access and manipulation.