First published: Tue Jun 11 2024(Updated: )
Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the command line interpreter of FortiOS may allow an authenticated attacker to execute unauthorized code or commands via specially crafted command line arguments.
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=7.4.0<=7.4.2 | |
FortiOS | >=7.2.0<=7.2.6 | |
FortiOS | >=7.0.0<=7.0.13 | |
FortiOS | >=6.4.0<=6.4.14 | |
FortiOS | >=6.2.0<=6.2.15 | |
FortiOS | >=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-460 is classified as high due to its potential to allow authenticated attackers to execute unauthorized code.
To fix FG-IR-23-460, update FortiOS to versions 7.4.3, 7.2.7, 7.0.14, 6.4.15, or 6.2.16 as applicable.
FortiOS versions from 6.0 to 7.4.2 are affected by FG-IR-23-460.
FG-IR-23-460 requires authenticated access to exploit the vulnerabilities.
FG-IR-23-460 describes multiple stack-based buffer overflow vulnerabilities affecting the command line interpreter in FortiOS.