Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-26010


A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specially crafted packets.


Published

2024-06-11T15:16:04.473

Last Modified

2024-12-11T19:54:35.323

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-121
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System fortinet fortios < 7.0.15 Yes
Operating System fortinet fortios < 7.2.8 Yes
Operating System fortinet fortios < 7.4.4 Yes
Operating System fortinet fortipam ≤ 1.3.0 Yes
Application fortinet fortiproxy < 7.0.17 Yes
Application fortinet fortiproxy < 7.2.10 Yes
Application fortinet fortiproxy < 7.4.4 Yes
Application fortinet fortiswitchmanager < 7.0.4 Yes
Application fortinet fortiswitchmanager < 7.2.4 Yes

References