First published: Tue Feb 11 2025(Updated: )
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiAnalyzer, FortiManager, FortiAnalyzer BigData, FortiAnalyzer Cloud and FortiManager Cloud GUI may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted HTTPS or HTTP requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.3 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2.2<=6.2.13 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer Cloud | >=7.2.1<=7.2.5 | |
Fortinet FortiAnalyzer Cloud | >=7.0 | |
Fortinet FortiAnalyzer Cloud | >=6.4 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.7 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.3 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2.2<=6.2.13 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiManager Cloud | >=7.2.1<=7.2.5 | |
Fortinet FortiManager Cloud | >=7.0 | |
Fortinet FortiManager Cloud | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability FG-IR-24-220 is classified as an OS Command Injection vulnerability, allowing authenticated privileged attackers to execute unauthorized commands.
To fix FG-IR-24-220, update to the appropriate version of FortiAnalyzer, FortiManager, or their cloud counterparts as specified in the advisory.
FG-IR-24-220 affects various versions of FortiAnalyzer, FortiManager, FortiAnalyzer BigData, FortiAnalyzer Cloud, and FortiManager Cloud.
The FG-IR-24-220 vulnerability can be exploited by authenticated privileged users.
An attacker exploiting FG-IR-24-220 can execute unauthorized OS commands on the affected systems.