First published: Tue Apr 09 2024(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS command line interface may allow a local privileged attacker with CLI access to execute arbitrary code or commands via specially crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.15 | |
Fortinet FortiOS IPS Engine | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-413 is considered critical due to its potential for arbitrary code execution.
To fix FG-IR-23-413, upgrade FortiOS to version 7.4.2 or higher, 7.2.8 or higher, or 7.0.16 or higher, as applicable.
FG-IR-23-413 affects all versions of FortiOS prior to 7.4.2, 7.2.8, and 7.0.16.
FG-IR-23-413 is a use of externally-controlled format string vulnerability classified under CWE-134.
FG-IR-23-413 requires local CLI access, making it a local attack vector rather than a remote exploit.