First published: Tue Jan 14 2025(Updated: )
A use of hard-coded cryptographic key vulnerability [CWE-321] in FortiSwitch may allow a remote unauthenticated attacker in posession of the key to execute unauthorized code via crafted cryptographic requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSwitch | =. | |
Fortinet FortiSwitch | >=7.2.0<=7.2.5 | |
Fortinet FortiSwitch | >=7.0.0<=7.0.7 | |
Fortinet FortiSwitch | >=6.4.0<=6.4.13 | |
Fortinet FortiSwitch | >=6.2.0<=6.2.7 | |
Fortinet FortiSwitch | >=6.0.0<=6.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-260 is critical due to its potential to allow remote code execution by an unauthenticated attacker.
To fix FG-IR-23-260, update FortiSwitch to a version that is patched against this vulnerability, such as versions 7.4.1 or later.
FG-IR-23-260 affects multiple versions of FortiSwitch, including those ranging from 6.0.0 to 7.2.5.
Yes, FG-IR-23-260 can be exploited remotely by an attacker in possession of the hard-coded cryptographic key.
The impact of FG-IR-23-260 on FortiSwitch systems is the potential execution of unauthorized code, compromising system integrity and security.