Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-5103 Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.
Fixes

Solution

Please upgrade to FortiOS versions 5.6.13 or above. Please upgrade to FortiOS versions 6.0.11 or above. FortiOS versions 6.2.0 and above are not impacted. FortiOS versions 6.4.0 and above are not impacted. Workaround: Please ensure that Fortiheartbeat and Endpoint-Compliance are not both enabled on the same interface. FortiHeartbeat and Endpoint-Compliance can be disabled on a particular interface by following the below CLI commands: config system interface edit interface set endpoint-compliance disable (<-- Disabled by default) set fortiheartbeat disable next end


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00297}

epss

{'score': 0.00376}


Tue, 21 Jan 2025 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

Fri, 20 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Dec 2024 11:15:00 +0000

Type Values Removed Values Added
Description Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.
First Time appeared Fortinet
Fortinet fortios
Weaknesses CWE-121
CPEs cpe:2.3:o:fortinet:fortios:5.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.9:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortios
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:X/RC:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-12-20T17:25:13.362Z

Reserved: 2020-05-12T00:00:00.000Z

Link: CVE-2020-12820

cve-icon Vulnrichment

Updated: 2024-12-20T17:24:58.263Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-19T11:15:05.700

Modified: 2025-01-21T20:42:17.767

Link: CVE-2020-12820

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.