CVE Vulnerabilities

CVE-2024-23113

Use of Externally-Controlled Format String

Published: Feb 15, 2024 | Modified: Nov 29, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

Name Vendor Start Version End Version
Fortiproxy Fortinet 7.0.0 (including) 7.0.14 (including)
Fortiproxy Fortinet 7.2.0 (including) 7.2.8 (including)
Fortiproxy Fortinet 7.4.0 (including) 7.4.2 (including)
Fortiswitchmanager Fortinet 7.0.0 (including) 7.0.3 (including)
Fortiswitchmanager Fortinet 7.2.0 (including) 7.2.3 (including)
Fortios Fortinet 7.0.0 (including) 7.0.13 (including)
Fortios Fortinet 7.2.0 (including) 7.2.6 (including)
Fortios Fortinet 7.4.0 (including) 7.4.2 (including)
Fortipam Fortinet 1.0.0 (including) 1.0.3 (including)
Fortipam Fortinet 1.1.0 (including) 1.1.2 (including)
Fortipam Fortinet 1.2.0 (including) 1.2.0 (including)

Potential Mitigations

References