6.7

CVE-2023-40721

A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiOS version 7.4.0 through 7.4.1 and before 7.2.6, FortiProxy version 7.4.0 and before 7.2.7, FortiPAM version 1.1.2 and before 1.0.3, FortiSwitchManager version 7.2.0 through 7.2.2 and before 7.0.2 allows a privileged attacker to execute arbitrary code or commands via specially crafted requests.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
FortinetFortios Version >= 6.2.0 < 7.0.14
FortinetFortios Version >= 7.2.0 < 7.2.7
FortinetFortios Version7.4.0
FortinetFortiswitchmanager Version >= 7.0.0 < 7.0.3
FortinetFortiswitchmanager Version >= 7.2.0 < 7.2.3
FortinetFortiproxy Version >= 1.2.0 < 7.0.15
FortinetFortiproxy Version >= 7.2.0 < 7.2.8
FortinetFortiproxy Version7.4.0
FortinetFortipam Version >= 1.0.0 < 1.2.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.091
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
psirt@fortinet.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-134 Use of Externally-Controlled Format String

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.