9.8
CVE-2024-23113
- EPSS 51.23%
- Veröffentlicht 15.02.2024 14:15:46
- Zuletzt bearbeitet 24.10.2025 12:54:40
- Quelle psirt@fortinet.com
- CVE-Watchlists
- Unerledigt
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ Fortiproxy Version >= 7.0.0 <= 7.0.14
Fortinet ≫ Fortiproxy Version >= 7.2.0 <= 7.2.8
Fortinet ≫ Fortiproxy Version >= 7.4.0 <= 7.4.2
Fortinet ≫ Fortiswitchmanager Version >= 7.0.0 <= 7.0.3
Fortinet ≫ Fortiswitchmanager Version >= 7.2.0 <= 7.2.3
09.10.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog
Fortinet Multiple Products Format String Vulnerability
SchwachstelleFortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
BeschreibungApply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Erforderliche Maßnahmen09.02.2024: CERT.at Warnung
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 51.23% | 0.977 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| psirt@fortinet.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.