Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49875 | A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests. |
Solution
Please upgrade to FortiOS version 7.4.1 or above Please upgrade to FortiOS version 7.2.6 or above Please upgrade to FortiSwitchManager version 7.2.3 or above Please upgrade to FortiSwitchManager version 7.0.3 or above Please upgrade to FortiProxy version 7.2.6 or above Please upgrade to FortiProxy version 7.0.12 or above Please upgrade to FortiPAM version 1.1.1 or above Please upgrade to FortiSASE version 22.4 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-137 |
|
No history.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T20:21:16.756Z
Reserved: 2023-10-09T08:01:29.296Z
Link: CVE-2023-45583
Updated: 2024-08-02T20:21:16.756Z
Status : Modified
Published: 2024-05-14T17:15:22.750
Modified: 2024-11-21T08:27:00.447
Link: CVE-2023-45583
No data.
OpenCVE Enrichment
No data.
EUVD