Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-23108", "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "state": "PUBLISHED", "assignerShortName": "fortinet", "dateReserved": "2024-01-11T16:29:07.979Z", "datePublished": "2024-02-05T13:26:15.727Z", "dateUpdated": "2025-04-24T15:54:48.080Z"}, "containers": {"cna": {"affected": [{"vendor": "Fortinet", "product": "FortiSIEM", "defaultStatus": "unaffected", "versions": [{"versionType": "semver", "version": "7.1.0", "lessThanOrEqual": "7.1.1", "status": "affected"}, {"versionType": "semver", "version": "7.0.0", "lessThanOrEqual": "7.0.2", "status": "affected"}, {"versionType": "semver", "version": "6.7.0", "lessThanOrEqual": "6.7.8", "status": "affected"}, {"versionType": "semver", "version": "6.6.0", "lessThanOrEqual": "6.6.3", "status": "affected"}, {"versionType": "semver", "version": "6.5.0", "lessThanOrEqual": "6.5.2", "status": "affected"}]}], "descriptions": [{"lang": "en", "value": "An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.1.0 through 7.1.1 and 7.0.0 through 7.0.2 and 6.7.0 through 6.7.8 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.2 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via via\u00a0crafted API requests."}], "providerMetadata": {"orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet", "dateUpdated": "2024-02-05T13:26:15.727Z"}, "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-78", "description": "Execute unauthorized code or commands", "type": "CWE"}]}], "metrics": [{"format": "CVSS", "cvssV3_1": {"version": "3.1", "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.7, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:X/RC:C"}}], "solutions": [{"lang": "en", "value": "Please upgrade to FortiSIEM version 7.1.2 or above \nPlease upgrade to upcoming FortiSIEM version 7.2.0 or above \nPlease upgrade to upcoming FortiSIEM version 7.0.3 or above \nPlease upgrade to upcoming FortiSIEM version 6.7.9 or above \nPlease upgrade to upcoming FortiSIEM version 6.6.5 or above \nPlease upgrade to upcoming FortiSIEM version 6.5.3 or above \nPlease upgrade to upcoming FortiSIEM version 6.4.4 or above \n"}], "references": [{"name": "https://fortiguard.com/psirt/FG-IR-23-130", "url": "https://fortiguard.com/psirt/FG-IR-23-130"}]}, "adp": [{"references": [{"url": "https://github.com/horizon3ai/CVE-2024-23108", "tags": ["exploit"]}], "affected": [{"vendor": "fortinet", "product": "fortisiem", "cpes": ["cpe:2.3:a:fortinet:fortisiem:7.1.0:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "7.1.0", "status": "affected", "lessThanOrEqual": "7.1.1", "versionType": "custom"}]}, {"vendor": "fortinet", "product": "fortisiem", "cpes": ["cpe:2.3:a:fortinet:fortisiem:7.0.0:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "7.0.0", "status": "affected", "lessThanOrEqual": "7.0.2", "versionType": "custom"}]}, {"vendor": "fortinet", "product": "fortisiem", "cpes": ["cpe:2.3:a:fortinet:fortisiem:6.7.0:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "6.7.0", "status": "affected", "lessThanOrEqual": "6.7.8", "versionType": "custom"}]}, {"vendor": "fortinet", "product": "fortisiem", "cpes": ["cpe:2.3:a:fortinet:fortisiem:6.6.0:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "6.6.0", "status": "affected", "lessThanOrEqual": "6.6.3", "versionType": "custom"}]}, {"vendor": "fortinet", "product": "fortisiem", "cpes": ["cpe:2.3:a:fortinet:fortisiem:6.5.0:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "6.5.0", "status": "affected", "lessThanOrEqual": "6.5.2", "versionType": "custom"}]}, {"vendor": "fortinet", "product": "fortisiem", "cpes": ["cpe:2.3:a:fortinet:fortisiem:6.4.0:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "6.4.0", "status": "affected", "lessThanOrEqual": "6.4.2", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-24T15:54:24.346642Z", "id": "CVE-2024-23108", "options": [{"Exploitation": "poc"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-24T15:54:48.080Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T22:51:11.211Z"}, "title": "CVE Program Container", "references": [{"name": "https://fortiguard.com/psirt/FG-IR-23-130", "url": "https://fortiguard.com/psirt/FG-IR-23-130", "tags": ["x_transferred"]}]}]}}