FortiManager Vulnerability Allows Privileged Attacker to Execute Unauthorized Code

CVE-2023-41842
6.3MEDIUM

Key Information

Vendor
Fortinet
Status
Fortimanager
Fortianalyzer
Fortiportal
Vendor
CVE Published:
12 March 2024

Summary

A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.

Affected Version(s)

FortiManager <= 7.4.1

FortiManager <= 7.2.3

FortiManager <= 7.0.9

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: 6.7 to: 6.3 - (MEDIUM)

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database
.