A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-137 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T16:52:54.010Z
Reserved: 2023-06-25T18:03:39.227Z
Link: CVE-2023-36640

Updated: 2024-08-02T16:52:54.010Z

Status : Modified
Published: 2024-05-14T17:15:16.640
Modified: 2024-11-21T08:10:09.313
Link: CVE-2023-36640

No data.