A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted command.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-119 |
![]() ![]() ![]() |
History
Tue, 10 Dec 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortios Fortinet fortipam Fortinet fortiproxy |
|
CPEs | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortios Fortinet fortipam Fortinet fortiproxy |

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-22T17:41:03.191Z
Reserved: 2023-04-03T08:47:30.452Z
Link: CVE-2023-29181

Updated: 2024-08-02T14:00:15.852Z

Status : Analyzed
Published: 2024-02-22T10:15:08.140
Modified: 2024-12-10T19:07:41.227
Link: CVE-2023-29181

No data.