First published: Tue Dec 12 2023(Updated: )
A format string vulnerability [CWE-134] in the HTTPSd daemon of FortiOS, FortiProxy and FortiPAM may allow an authenticated user to execute unauthorized code or commands via specially crafted API requests.
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | =. | |
FortiOS | >=7.2.0<=7.2.4 | |
FortiOS | >=7.0.0<=7.0.11 | |
FortiOS | >=6.4.0<=6.4.12 | |
FortiOS | >=6.2.0<=6.2.15 | |
FortiOS | >=6.0 | |
FortiGuard FortiPAM | =. | |
FortiGuard FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.2.0<=7.2.4 | |
Fortinet FortiProxy | >=7.0.0<=7.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-138 is high due to the potential for unauthorized code execution.
To fix FG-IR-23-138, upgrade FortiOS, FortiProxy, or FortiPAM to the specified remedial versions based on your current version.
FG-IR-23-138 affects FortiOS, FortiProxy, and FortiPAM across several versions.
FG-IR-23-138 is a format string vulnerability classified under CWE-134.
The vendor for FG-IR-23-138 is Fortinet.