6.7

CVE-2023-41842

A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and  Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FortinetFortianalyzer Version >= 6.2.0 < 7.0.10
FortinetFortianalyzer Version >= 7.2.0 < 7.2.4
FortinetFortianalyzer Version >= 7.4.0 < 7.4.2
FortinetFortianalyzer Big Data Version >= 6.4.5 <= 6.4.7
FortinetFortianalyzer Big Data Version >= 7.0.1 <= 7.0.6
FortinetFortianalyzer Big Data Version >= 7.2.0 < 7.2.6
FortinetFortianalyzer Big Data Version6.2.5
FortinetFortimanager Version >= 6.2.0 < 7.0.10
FortinetFortimanager Version >= 7.2.0 < 7.2.4
FortinetFortimanager Version >= 7.4.0 < 7.4.2
FortinetFortiportal Version >= 5.3.0 < 6.0.15
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.216
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
psirt@fortinet.com 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-134 Use of Externally-Controlled Format String

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.