First published: Tue May 14 2024(Updated: )
Multiple format string bug vulnerabilitues [CWE-134] in FortiOS, FortiProxy, FortiPAM & FortiSwitchManager command line interpreter and httpd may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted commands and http requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiOS IPS Engine | >=6.0.0<=6.0.16 | |
FortiGuard FortiPAM | =. | |
FortiGuard FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.2.0<=7.2.5 | |
Fortinet FortiProxy | >=7.0.0<=7.0.11 | |
Fortinet FortiProxy | >=2.0 | |
Fortinet FortiProxy | >=1.2 | |
Fortinet FortiProxy | >=1.1 | |
Fortinet FortiProxy | >=1.0 | |
Fortinet FortiSwitchManager | >=7.2.0<=7.2.2 | |
Fortinet FortiSwitchManager | >=7.0.0<=7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
FG-IR-23-137 has a high severity rating due to the potential for arbitrary code execution by an authenticated attacker.
To fix FG-IR-23-137, upgrade FortiOS, FortiProxy, FortiPAM, or FortiSwitchManager to the recommended versions or later.
FG-IR-23-137 affects FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager with various version ranges.
FG-IR-23-137 requires authentication, hence exploitation must come from an authenticated attacker.
The potential impacts of FG-IR-23-137 include arbitrary code execution, which can lead to system compromise.