First published: Tue Nov 12 2024(Updated: )
A stack-based buffer overflow vulnerability [CWE-121] in FortiManager, FortiAnalyzer and FortiAnalyzer-BigData CLI may allow a privileged attacker to execute unauthorized code or commands via crafted CLI requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-098 is critical due to its potential to allow privileged attackers to execute unauthorized code.
To fix FG-IR-24-098, upgrade your FortiManager or FortiAnalyzer to the recommended versions as specified in the advisory.
FG-IR-24-098 affects FortiManager versions prior to 7.2.6 and 7.4.3.
FG-IR-24-098 impacts FortiAnalyzer versions prior to 7.2.6 and 7.4.3.
Yes, FG-IR-24-098 can lead to remote code execution if exploited by a privileged attacker.