First published: Tue Mar 12 2024(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiManager, FortiAnalyzer, FortiAnalyzer-BigData & FortiPortal may allow a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | ||
Fortinet FortiAnalyzer | ||
Fortinet FortiAnalyzer | ||
Fortinet FortiPortal |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-304 is critical due to the potential for privileged attackers to execute unauthorized code or commands.
To fix FG-IR-23-304, it is recommended to update FortiManager, FortiAnalyzer, FortiAnalyzer-BigData, and FortiPortal to the latest patched versions.
FG-IR-23-304 affects FortiManager, FortiAnalyzer, FortiAnalyzer-BigData, and FortiPortal.
FG-IR-23-304 is a use of externally-controlled format string vulnerability that can lead to unauthorized code execution.
FG-IR-23-304 can be exploited by privileged attackers through specially crafted command arguments.