Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-45324


A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.


Published

2025-03-11T15:15:41.743

Last Modified

2025-07-24T19:06:14.957

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

Weaknesses
  • Type: Primary
    CWE-134

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System fortinet fortios < 6.2.17 Yes
Operating System fortinet fortios < 6.4.16 Yes
Operating System fortinet fortios < 7.0.16 Yes
Operating System fortinet fortios < 7.2.10 Yes
Operating System fortinet fortios < 7.4.5 Yes
Operating System fortinet fortipam ≤ 1.3.1 Yes
Operating System fortinet fortipam < 1.4.3 Yes
Application fortinet fortiproxy < 7.0.20 Yes
Application fortinet fortiproxy < 7.2.13 Yes
Application fortinet fortiproxy < 7.4.7 Yes
Application fortinet fortiproxy 7.6.0 Yes
Application fortinet fortiweb < 7.0.11 Yes
Application fortinet fortiweb < 7.2.11 Yes
Application fortinet fortiweb < 7.4.6 Yes
Application fortinet fortiweb 7.6.0 Yes
Application fortinet fortisra < 1.4.3 Yes

References