First published: Tue Feb 11 2025(Updated: )
A stack-based buffer overflow [CWE-121] vulnerability in FortiOS CAPWAP control may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.2.4<=7.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-160 is considered high due to its potential for remote code execution.
To fix FG-IR-24-160, upgrade FortiOS to version 7.4.5 or 7.2.9 or later.
FG-IR-24-160 affects FortiOS versions from 7.4.0 to 7.4.4 and from 7.2.4 to 7.2.8.
Yes, FG-IR-24-160 can be exploited by remote unauthenticated attackers.
FG-IR-24-160 is classified as a stack-based buffer overflow vulnerability.