A stack-based buffer overflow vulnerability in FortiProxy physical appliance CLI 2.0.0 to 2.0.1, 1.2.0 to 1.2.9, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 may allow an authenticated, remote attacker to perform a Denial of Service attack by running the `diagnose sys cpuset` with a large cpuset mask value. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.
2021-06-03T11:15:08.527
2024-11-21T05:49:33.780
Modified
CVSSv3.1: 6.7 (MEDIUM)
AV:N/AC:L/Au:S/C:N/I:N/A:P
8.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fortinet | fortiproxy | ≤ 1.0.7 | Yes |
Application | fortinet | fortiproxy | ≤ 1.1.6 | Yes |
Application | fortinet | fortiproxy | < 1.2.10 | Yes |
Application | fortinet | fortiproxy | < 2.0.2 | Yes |