A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted command.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-119 |
History
Tue, 10 Dec 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortios Fortinet fortipam Fortinet fortiproxy |
|
CPEs | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortios Fortinet fortipam Fortinet fortiproxy |
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-02-22T09:40:06.212Z
Updated: 2024-08-22T17:41:03.191Z
Reserved: 2023-04-03T08:47:30.452Z
Link: CVE-2023-29181
Vulnrichment
Updated: 2024-08-02T14:00:15.852Z
NVD
Status : Analyzed
Published: 2024-02-22T10:15:08.140
Modified: 2024-12-10T19:07:41.227
Link: CVE-2023-29181
Redhat
No data.