First published: Tue Mar 11 2025(Updated: )
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS, FortiProxy, FortiPAM, FortiSRA and FortiWeb may allow a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.9 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.15 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.15 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
FortiGuard FortiPAM | >=1.4.0<=1.4.2 | |
FortiGuard FortiPAM | >=1.3.0<=1.3.1 | |
FortiGuard FortiPAM | >=1.2 | |
FortiGuard FortiPAM | >=1.1 | |
FortiGuard FortiPAM | >=1.0 | |
Fortinet FortiProxy | =. | |
Fortinet FortiProxy | >=7.4.0<=7.4.6 | |
Fortinet FortiProxy | >=7.2.0<=7.2.12 | |
Fortinet FortiProxy | >=7.0.0<=7.0.19 | |
Fortinet FortiSRA | >=1.4.0<=1.4.2 | |
Fortinet FortiWeb | =. | |
Fortinet FortiWeb | >=7.4.0<=7.4.5 | |
Fortinet FortiWeb | >=7.2.0<=7.2.10 | |
Fortinet FortiWeb | >=7.0.0<=7.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-325 is critical due to the potential for unauthorized code execution.
To mitigate FG-IR-24-325, update to the recommended versions of affected products as specified by Fortinet.
FG-IR-24-325 affects FortiOS, FortiProxy, FortiPAM, FortiSRA, and FortiWeb versions prior to their respective remedies.
FG-IR-24-325 can be exploited by a privileged attacker through specially crafted HTTP or HTTPS commands.
FG-IR-24-325 is defined as a use of externally-controlled format string vulnerability, classified as CWE-134.