First published: Tue Jan 14 2025(Updated: )
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiManager csfd daemon may allow an authenticated attacker to execute unauthorized commands via specifically crafted packets
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiManager | >=7.4.1<=7.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-222 vulnerability has been classified with a high severity due to the potential for unauthorized command execution.
To address the FG-IR-24-222 vulnerability, upgrade FortiManager or FortiManager Cloud to version 7.4.4 or later.
The FG-IR-24-222 vulnerability affects users of FortiManager and FortiManager Cloud versions 7.4.1 to 7.4.3.
Yes, FG-IR-24-222 can be exploited by an authenticated attacker remotely via specially crafted packets.
FG-IR-24-222 is categorized as an improper neutralization of special elements used in an OS command vulnerability.