Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-23113


A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.


Published

2024-02-15T14:15:46.503

Last Modified

2025-10-24T12:54:40.720

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-134

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiproxy ≤ 7.0.14 Yes
Application fortinet fortiproxy ≤ 7.2.8 Yes
Application fortinet fortiproxy ≤ 7.4.2 Yes
Application fortinet fortiswitchmanager ≤ 7.0.3 Yes
Application fortinet fortiswitchmanager ≤ 7.2.3 Yes
Operating System fortinet fortios ≤ 7.0.13 Yes
Operating System fortinet fortios ≤ 7.2.6 Yes
Operating System fortinet fortios ≤ 7.4.2 Yes
Operating System fortinet fortipam ≤ 1.0.3 Yes
Operating System fortinet fortipam ≤ 1.1.2 Yes
Operating System fortinet fortipam 1.2.0 Yes

References