Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-36639


A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, FortiOS versions 7.4.0, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiPAM versions 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted API requests.


Published

2023-12-13T07:15:12.900

Last Modified

2024-11-21T08:10:09.100

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

Weaknesses
  • Type: Primary
    CWE-134

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiproxy ≤ 7.0.10 Yes
Application fortinet fortiproxy ≤ 7.2.4 Yes
Operating System fortinet fortios ≤ 6.0.17 Yes
Operating System fortinet fortios ≤ 6.2.15 Yes
Operating System fortinet fortios ≤ 6.4.12 Yes
Operating System fortinet fortios ≤ 7.0.11 Yes
Operating System fortinet fortios ≤ 7.2.4 Yes
Operating System fortinet fortios 7.4.0 Yes
Operating System fortinet fortipam ≤ 1.0.3 Yes
Operating System fortinet fortipam 1.1.0 Yes

References