First published: Tue Jun 11 2024(Updated: )
Multiple stack-based buffer overflow vulnerabilities [CWE-121] in FortiOS may allow an authenticated attacker to achieve arbitrary code execution via specially crafted CLI commands.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=7.4.0<=7.4.3 | |
Fortinet FortiOS | >=7.2.0<=7.2.7 | |
Fortinet FortiOS | >=7.0.0<=7.0.15 | |
Fortinet FortiOS | >=6.4 | |
Fortinet FortiOS | >=6.2 | |
Fortinet FortiOS | >=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-356 is critical due to the potential for arbitrary code execution.
To fix FG-IR-23-356, update FortiOS to version 7.4.4, 7.2.8, or 7.0.16 or higher.
FG-IR-23-356 may allow authenticated attackers to execute arbitrary code via specially crafted CLI commands.
FortiOS versions 7.4.0 to 7.4.3, 7.2.0 to 7.2.7, and 7.0.0 to 7.0.15 are specifically affected by FG-IR-23-356.
FG-IR-23-356 requires authentication, meaning an attacker needs valid credentials to exploit the vulnerability.