A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-23-356 |
![]() ![]() ![]() |
History
Fri, 23 Aug 2024 03:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortios |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | |
Vendors & Products |
Fortinet
Fortinet fortios |

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T20:53:20.902Z
Reserved: 2023-10-25T08:43:15.290Z
Link: CVE-2023-46720

Updated: 2024-08-02T20:53:20.902Z

Status : Modified
Published: 2024-06-11T15:15:55.087
Modified: 2024-11-21T08:29:08.810
Link: CVE-2023-46720

No data.