First published: Tue Nov 12 2024(Updated: )
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiManager, FortiAnalyzer & FortiAnalyzer-BigData CLI may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.7 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-116 vulnerability has a high severity due to its potential for OS command injection by an authenticated privileged attacker.
To remediate the FG-IR-24-116 vulnerability, update your FortiAnalyzer or FortiManager software to the recommended versions provided by Fortinet.
The FG-IR-24-116 vulnerability affects FortiManager and FortiAnalyzer, particularly versions below the specified remedial versions.
FG-IR-24-116 requires authentication, thus it can only be exploited by an authenticated privileged user with access to the affected systems.
Exploitation of the FG-IR-24-116 vulnerability could allow an attacker to execute unauthorized commands on the affected system, leading to potential data breaches or system compromise.