First published: Mon Oct 07 2024(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiAnalyzer fazsvcd daemon may allow a remote privileged attacker with admin profile to execute arbitrary code or commands via specially crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.3 | |
Fortinet FortiAnalyzer | >=7.2.2<=7.2.5 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer Cloud | >=7.2.2<=7.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-196 is critical, as it allows remote privileged attackers to execute arbitrary code or commands.
To fix FG-IR-24-196, upgrade FortiAnalyzer or FortiAnalyzer Cloud to versions 7.4.4 or 7.2.7 or later.
FG-IR-24-196 affects FortiAnalyzer versions 7.4.0 to 7.4.3 and 7.2.2 to 7.2.5, as well as corresponding FortiAnalyzer Cloud versions.
Organizations using vulnerable versions of FortiAnalyzer or FortiAnalyzer Cloud are impacted by FG-IR-24-196.
Yes, a remote privileged attacker must have an admin profile to exploit FG-IR-24-196.