Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-45583


A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.


Published

2024-05-14T17:15:22.750

Last Modified

2024-11-21T08:27:00.447

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.7 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-134

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiproxy < 7.0.12 Yes
Application fortinet fortiproxy < 7.2.6 Yes
Application fortinet fortiswitchmanager < 7.0.3 Yes
Application fortinet fortiswitchmanager < 7.2.3 Yes
Operating System fortinet fortios < 7.2.6 Yes
Operating System fortinet fortios ≤ 6.2.16 Yes
Operating System fortinet fortios ≤ 6.4.15 Yes
Operating System fortinet fortios ≤ 7.0.12 Yes
Operating System fortinet fortios ≤ 7.2.5 Yes
Operating System fortinet fortios 7.4.0 Yes
Operating System fortinet fortipam ≤ 1.0.3 Yes
Operating System fortinet fortipam 1.1.0 Yes

References