Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities vulnerability in Fortinet allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests.
The product uses or accesses a resource that has not been initialized.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Fortios | Fortinet | 6.4.7 (including) | 6.4.15 (excluding) |
| Fortios | Fortinet | 7.0.1 (including) | 7.0.13 (excluding) |
| Fortios | Fortinet | 7.2.0 (including) | 7.2.6 (excluding) |
| Fortios | Fortinet | 7.4.0 (including) | 7.4.0 (including) |