Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-46333 | A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments. |
Solution
Please upgrade to FortiManager version 7.4.2 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.10 or above Please upgrade to FortiAnalyzer version 7.4.2 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.10 or above Please upgrade to FortiAnalyzer-BigData version 7.4.0 or above Please upgrade to FortiAnalyzer-BigData version 7.2.6 or above Please upgrade to FortiPortal version 7.0.0 or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-304 |
![]() ![]() ![]() |
Fri, 11 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet fortianalyzer Big Data
|
|
CPEs | cpe:2.3:a:fortinet:fortianalyzer_bigdata:6.2.5:*:*:*:*:*:*:* |
cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer_big_data:6.2.5:*:*:*:*:*:*:* |
Vendors & Products |
Fortinet fortianalyzer Bigdata
|
Fortinet fortianalyzer Big Data
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-12T18:09:17.558Z
Reserved: 2023-09-04T08:12:52.814Z
Link: CVE-2023-41842

Updated: 2024-08-02T19:09:49.300Z

Status : Analyzed
Published: 2024-03-12T15:15:45.920
Modified: 2025-07-11T20:06:38.330
Link: CVE-2023-41842

No data.

No data.