First published: Tue Feb 11 2025(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS, FortiProxy, FortiPAM & FortiSwitchManager CLI may allow a privileged attacker to execute arbitrary code or commands via specially crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy | ||
FortiGuard FortiPAM | ||
Fortinet FortiSwitchManager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-261 is critical due to potential arbitrary code execution by an attacker.
To fix FG-IR-23-261, update FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager to the latest available versions that include the security patches.
FG-IR-23-261 affects users of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager.
FG-IR-23-261 is classified as a use of externally-controlled format string vulnerability.
An attacker exploiting FG-IR-23-261 can execute arbitrary code or commands through specially crafted requests.