First published: Tue Nov 12 2024(Updated: )
A heap-based buffer overflow vulnerability [CWE-122] in FortiManager and FortiAnalyzer httpd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands as a low priivileged user via specifically crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.2 | |
Fortinet FortiAnalyzer Cloud | >=7.2.1<=7.2.6 | |
Fortinet FortiAnalyzer Cloud | >=7.0 | |
Fortinet FortiAnalyzer Cloud | >=6.4 | |
Fortinet FortiManager Cloud | >=7.0 | |
Fortinet FortiManager Cloud | >=6.4 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.4.1<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.2.1<=7.2.6 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 | |
Fortinet FortiManager | >=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-125 vulnerability is classified as a high severity issue due to the potential for remote code execution.
To fix the FG-IR-24-125 vulnerability, upgrade to FortiManager version 7.4.3 or 7.2.6 or the appropriate patched version for FortiAnalyzer.
The FG-IR-24-125 vulnerability affects multiple Fortinet products, including FortiManager and FortiAnalyzer across several versions.
FG-IR-24-125 is a heap-based buffer overflow vulnerability that allows attackers to execute arbitrary code.
Yes, FG-IR-24-125 can be exploited remotely by an unauthenticated attacker through specially crafted requests.