First published: Wed Dec 18 2024(Updated: )
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiManager may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.4.0<=7.4.4 | |
Fortinet FortiManager | >=7.4.1<=7.4.4 | |
Fortinet FortiManager | >=7.2.3<=7.2.7 | |
Fortinet FortiManager | >=7.2.1<=7.2.7 | |
Fortinet FortiManager | >=7.0.5<=7.0.12 | |
Fortinet FortiManager | >=7.0.1<=7.0.12 | |
Fortinet FortiManager | >=6.4.10<=6.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-425 vulnerability is rated as critical due to its potential for OS Command Injection.
To remediate FG-IR-24-425, update FortiManager to a version that includes the fix, such as versions 7.6.1 or 7.4.5 and above.
FG-IR-24-425 affects FortiManager versions 7.0.1 through 7.4.4 and earlier versions of FortiManager.
Yes, FG-IR-24-425 allows an authenticated remote attacker to exploit the vulnerability via crafted FGFM requests.
FG-IR-24-425 is classified as an OS Command Injection vulnerability specifically identified as CWE-78.