7.2
CVE-2025-68648
- EPSS 0.08%
- Veröffentlicht 10.03.2026 16:44:15
- Zuletzt bearbeitet 13.03.2026 15:31:08
- Quelle psirt@fortinet.com
- CVE-Watchlists
- Unerledigt
A use of externally-controlled format string vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4.0 through 7.4.7, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4.0 through 7.4.7, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions may allow an attacker to escalate its privileges via specially crafted requests.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ Fortianalyzer Version >= 7.0.0 < 7.4.8
Fortinet ≫ Fortianalyzer Version >= 7.6.0 < 7.6.5
Fortinet ≫ Fortianalyzer Cloud Version >= 7.0.0 < 7.4.8
Fortinet ≫ Fortianalyzer Cloud Version >= 7.6.0 < 7.6.5
Fortinet ≫ Fortimanager Version >= 7.0.0 < 7.4.8
Fortinet ≫ Fortimanager Version >= 7.6.0 < 7.6.5
Fortinet ≫ Fortimanager Cloud Version >= 7.0.0 < 7.4.8
Fortinet ≫ Fortimanager Cloud Version >= 7.6.0 < 7.6.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.224 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@fortinet.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.