PT-2024-1569 · Fortinet · Fortiswitchmanager+3
Published
2024-02-08
·
Updated
2026-03-06
·
CVE-2024-23113
CVSS v2.0
10
Critical
| AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiOS versions 7.0.0 through 7.0.13
Fortinet FortiOS versions 7.2.0 through 7.2.6
Fortinet FortiOS versions 7.4.0 through 7.4.2
FortiProxy versions 7.0.0 through 7.0.14
FortiProxy versions 7.2.0 through 7.2.8
FortiProxy versions 7.4.0 through 7.4.2
FortiPAM versions 1.0.0 through 1.0.3
FortiPAM versions 1.1.0 through 1.1.2
FortiPAM version 1.2.0
FortiSwitchManager versions 7.0.0 through 7.0.3
FortiSwitchManager versions 7.2.0 through 7.2.3
Description
A use of externally-controlled format string vulnerability in Fortinet FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. This issue affects multiple Fortinet products, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. The vulnerability is being actively exploited in the wild, with over 87,000 devices potentially at risk. It is recommended to upgrade to patched versions immediately to mitigate the risk of remote code execution attacks.
Recommendations
Upgrade Fortinet FortiOS versions 7.0.0 through 7.0.13 to version 7.0.14 or above
Upgrade Fortinet FortiOS versions 7.2.0 through 7.2.6 to version 7.2.7 or above
Upgrade Fortinet FortiOS versions 7.4.0 through 7.4.2 to version 7.4.3 or above
Upgrade FortiProxy versions 7.0.0 through 7.0.14 to a patched version
Upgrade FortiProxy versions 7.2.0 through 7.2.8 to a patched version
Upgrade FortiProxy versions 7.4.0 through 7.4.2 to a patched version
Upgrade FortiPAM versions 1.0.0 through 1.0.3 to a patched version
Upgrade FortiPAM versions 1.1.0 through 1.1.2 to a patched version
Upgrade FortiPAM version 1.2.0 to a patched version
Upgrade FortiSwitchManager versions 7.0.0 through 7.0.3 to a patched version
Upgrade FortiSwitchManager versions 7.2.0 through 7.2.3 to a patched version
As a temporary workaround, consider restricting access to the vulnerable module or function until a patch is available.
Exploit
Fix
Use of Externally-Controlled Format String
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Fortios
Fortipam
Fortiproxy
Fortiswitchmanager