6.7
CVE-2023-40721
- EPSS 0.04%
- Veröffentlicht 11.02.2025 17:15:21
- Zuletzt bearbeitet 14.01.2026 15:15:54
- Quelle psirt@fortinet.com
- CVE-Watchlists
- Unerledigt
A use of externally-controlled format string vulnerability [CWE-134] vulnerability in Fortinet allows a privileged attacker to execute arbitrary code or commands via specially crafted requests.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ FortiSwitch Manager Version >= 7.0.0 < 7.0.3
Fortinet ≫ FortiSwitch Manager Version >= 7.2.0 < 7.2.3
Fortinet ≫ FortiProxy Version >= 1.2.0 < 7.0.15
Fortinet ≫ FortiProxy Version >= 7.2.0 < 7.2.8
Fortinet ≫ FortiProxy Version7.4.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@fortinet.com | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.