CVE Vulnerabilities

CVE-2023-36640

Use of Externally-Controlled Format String

Published: May 14, 2024 | Modified: Nov 21, 2024
CVSS 3.x
6.7
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Fortiproxy Fortinet 1.0.0 (including) 1.0.7 (including)
Fortiproxy Fortinet 1.1.0 (including) 1.1.6 (including)
Fortiproxy Fortinet 1.2.0 (including) 1.2.13 (including)
Fortiproxy Fortinet 2.0.0 (including) 2.0.14 (including)
Fortiproxy Fortinet 7.0.0 (including) 7.0.10 (including)
Fortiproxy Fortinet 7.2.0 (including) 7.2.4 (including)

Potential Mitigations

References