A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-20635 | A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands |
Fixes
Solution
Please upgrade to FortiOS version 7.4.3 or above Please upgrade to FortiOS version 7.2.7 or above Please upgrade to FortiOS version 7.0.14 or above Please upgrade to FortiOS version 6.4.15 or above Please upgrade to FortiOS version 6.2.16 or above
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-460 |
|
History
Fri, 23 Aug 2024 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortios |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortinet
Fortinet fortios |
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-01T22:51:11.248Z
Reserved: 2024-01-11T16:29:07.979Z
Link: CVE-2024-23110
Updated: 2024-08-01T22:51:11.248Z
Status : Modified
Published: 2024-06-11T15:16:03.707
Modified: 2024-11-21T08:56:57.093
Link: CVE-2024-23110
No data.
OpenCVE Enrichment
No data.
EUVD