A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.6, version 6.4.0 through 6.4.11 and version 6.2.12 and below, FortiProxy version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.8, version 2.0.12 and below and FortiOS-6K7K version 7.0.5, version 6.4.0 through 6.4.10 and version 6.2.0 through 6.2.10 and below allows a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
Advisories

No advisories yet.

Fixes

Solution

Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.4 or above Please upgrade to FortiOS version 7.0.10 or above Please upgrade to FortiOS version 6.4.12 or above Please upgrade to FortiOS version 6.2.13 or above Please upgrade to FortiWeb version 7.2.2 or above Please upgrade to FortiWeb version 7.0.7 or above Please upgrade to FortiWeb version 6.4.3 or above Please upgrade to FortiWeb version 6.3.23 or above Please upgrade to FortiWeb version 6.2.8 or above Please upgrade to FortiWeb version 6.1.4 or above Please upgrade to upcoming FortiOS version 6.0.17 or above Please upgrade to FortiSwitchManager version 7.2.2 or above Please upgrade to FortiSwitchManager version 7.0.2 or above Please upgrade to FortiProxy version 7.2.3 or above Please upgrade to FortiProxy version 7.0.9 or above Please upgrade to FortiManager version 7.2.1 or above Please upgrade to FortiManager version 7.0.5 or above Please upgrade to FortiManager version 6.4.12 or above Please upgrade to FortiManager version 6.2.11 or above Please upgrade to FortiManager version 6.0.12 or above Please upgrade to FortiOS-6K7K version 7.0.10 or above Please upgrade to FortiOS-6K7K version 6.4.12 or above Please upgrade to FortiOS-6K7K version 6.2.13 or above Please upgrade to FortiAnalyzer version 7.2.1 or above Please upgrade to FortiAnalyzer version 7.0.5 or above Please upgrade to FortiAnalyzer version 6.4.12 or above Please upgrade to FortiAnalyzer version 6.2.11 or above Please upgrade to FortiAnalyzer version 6.0.12 or above ## Workaround for FortiOS: Disable HTTP/HTTPS administrative interface OR Limit IP addresses that can reach the administrative interface: ``` config firewall address edit my_allowed_addresses set subnet Y IP MY SUBNET end ``` Then create an Address Group: ``` config firewall addrgrp edit MGMT_IPs set member my_allowed_addresses end ``` Create the Local in Policy to restrict access only to the predefined group on management interface (here: port1): ``` config firewall local-in-policy edit 1 set intf port1 set srcaddr MGMT_IPs set dstaddr all set action accept set service HTTPS HTTP set schedule always set status enable next edit 2 set intf any set srcaddr all set dstaddr all set action deny set service HTTPS HTTP set schedule always set status enable end ``` If using non default ports, create appropriate service object for GUI administrative access: ``` config firewall service custom edit GUI_HTTPS set tcp-portrange admin-sport next edit GUI_HTTP set tcp-portrange admin-port end ``` Use these objects instead of "HTTPS HTTP" in the local-in policy 1 and 2 below. When using an HA reserved management interface, the local in policy needs to be configured slightly differently - please see: https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-configure-a-local-in-policy-on-a-HA/ta-p/222005 Please contact customer support for assistance. ## Workaround for FortiManager and FortiAnalyzer: Limit IP addresses that can reach the administrative interface ## Workaround for FortiWeb: Disable HTTP/HTTPS administrative interface OR Limit IP addresses that can reach the administrative interface


Workaround

No workaround given by the vendor.

References
History

Thu, 24 Jul 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet fortios-6k7k
Fortinet fortiproxy
Fortinet fortiswitch
Fortinet fortiswitchmanager
Fortinet fortiweb
CPEs cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortios-6k7k:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortios-6k7k:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:*
Vendors & Products Fortinet fortios-6k7k
Fortinet fortiproxy
Fortinet fortiswitch
Fortinet fortiswitchmanager
Fortinet fortiweb

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.08343}

epss

{'score': 0.1078}


Mon, 24 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Mar 2025 16:00:00 +0000

Type Values Removed Values Added
Description A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.6, version 6.4.0 through 6.4.11 and version 6.2.12 and below, FortiProxy version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.8, version 2.0.12 and below and FortiOS-6K7K version 7.0.5, version 6.4.0 through 6.4.10 and version 6.2.0 through 6.2.10 and below allows a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
First Time appeared Fortinet
Fortinet fortianalyzer
Fortinet fortimanager
Fortinet fortios
Weaknesses CWE-124
CPEs cpe:2.3:o:fortinet:fortianalyzer:6.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:5.6.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.16:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.17:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.18:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:6.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.2.3:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortianalyzer
Fortinet fortimanager
Fortinet fortios
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-24T18:42:44.673Z

Reserved: 2023-02-08T13:42:03.367Z

Link: CVE-2023-25610

cve-icon Vulnrichment

Updated: 2025-03-24T16:26:45.788Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-24T16:15:17.273

Modified: 2025-07-24T19:56:34.070

Link: CVE-2023-25610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.