9.8

CVE-2024-23113

Warning

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

Data is provided by the National Vulnerability Database (NVD)
FortinetFortiproxy Version >= 7.0.0 <= 7.0.14
FortinetFortiproxy Version >= 7.2.0 <= 7.2.8
FortinetFortiproxy Version >= 7.4.0 <= 7.4.2
FortinetFortiswitchmanager Version >= 7.0.0 <= 7.0.3
FortinetFortiswitchmanager Version >= 7.2.0 <= 7.2.3
FortinetFortios Version >= 7.0.0 <= 7.0.13
FortinetFortios Version >= 7.2.0 <= 7.2.6
FortinetFortios Version >= 7.4.0 <= 7.4.2
FortinetFortipam Version >= 1.0.0 <= 1.0.3
FortinetFortipam Version >= 1.1.0 <= 1.1.2
FortinetFortipam Version1.2.0

09.10.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Fortinet Multiple Products Format String Vulnerability

Vulnerability

Fortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 45.02% 0.975
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
psirt@fortinet.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-134 Use of Externally-Controlled Format String

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.