CVE Vulnerabilities

CVE-2023-36639

Use of Externally-Controlled Format String

Published: Dec 13, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, FortiOS versions 7.4.0, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiPAM versions 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted API requests.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
FortiproxyFortinet7.0.0 (including)7.0.10 (including)
FortiproxyFortinet7.2.0 (including)7.2.4 (including)
FortiosFortinet6.0.0 (including)6.0.17 (including)
FortiosFortinet6.2.0 (including)6.2.15 (including)
FortiosFortinet6.4.0 (including)6.4.12 (including)
FortiosFortinet7.0.0 (including)7.0.11 (including)
FortiosFortinet7.2.0 (including)7.2.4 (including)
FortiosFortinet7.4.0 (including)7.4.0 (including)
FortipamFortinet1.0.0 (including)1.0.3 (including)
FortipamFortinet1.1.0 (including)1.1.0 (including)

Potential Mitigations

References