First published: Thu Feb 08 2024(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. A third-party report is indicating this may be exploited in the wild.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.2 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.6 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.13 | |
FortiGuard FortiPAM | >=1.2 | |
FortiGuard FortiPAM | >=1.1 | |
FortiGuard FortiPAM | >=1.0 | |
Fortinet FortiProxy | >=7.4.0<=7.4.2 | |
Fortinet FortiProxy | >=7.2.0<=7.2.8 | |
Fortinet FortiProxy | >=7.0.0<=7.0.15 | |
Fortinet FortiSwitchManager | >=7.2.0<=7.2.3 | |
Fortinet FortiSwitchManager | >=7.0.0<=7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-029 is high, as it may allow remote unauthenticated attackers to execute arbitrary code.
To fix FG-IR-24-029, upgrade FortiOS to version 7.4.3 or higher, or apply the appropriate patches for affected versions.
FG-IR-24-029 affects multiple versions of FortiOS, FortiProxy, FortiSwitchManager, and FortiPAM.
Yes, reports indicate that FG-IR-24-029 can be exploited in the wild by attackers.
There is no specific workaround for FG-IR-24-029, so it is recommended to apply available patches promptly.