A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-074 |
![]() ![]() |
History
Wed, 23 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:25:53.423Z
Reserved: 2023-05-22T07:58:22.196Z
Link: CVE-2023-33299

Updated: 2024-08-02T15:39:36.130Z

Status : Modified
Published: 2023-06-23T08:15:09.483
Modified: 2024-11-21T08:05:22.070
Link: CVE-2023-33299

No data.