FortiManager Vulnerability Allows Privileged Attacker to Execute Unauthorized Code
CVE-2023-41842
6.3MEDIUM
Key Information
- Vendor
- Fortinet
- Status
- Fortimanager
- Fortianalyzer
- Fortiportal
- Vendor
- CVE Published:
- 12 March 2024
Summary
A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
Affected Version(s)
FortiManager <= 7.4.1
FortiManager <= 7.2.3
FortiManager <= 7.0.9
CVSS V3.1
Score:
6.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Risk change from: 6.7 to: 6.3 - (MEDIUM)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database