A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiAP-S 6.2 all verisons, and 6.4.0 through 6.4.9, FortiAP-W2 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2, FortiAP 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2 allow a local authenticated attacker to execute unauthorized code via the CLI.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-23-405 |
History
Wed, 15 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiAP-S 6.2 all verisons, and 6.4.0 through 6.4.9, FortiAP-W2 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2, FortiAP 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2 allow a local authenticated attacker to execute unauthorized code via the CLI. | |
First Time appeared |
Fortinet
Fortinet fortiap Fortinet fortiap-s |
|
Weaknesses | CWE-78 | |
CPEs | cpe:2.3:a:fortinet:fortiap-s:6.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:6.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:6.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:6.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:6.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:6.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:6.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:6.4.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap:7.4.2:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortiap Fortinet fortiap-s |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2025-01-14T14:09:54.124Z
Updated: 2025-01-15T14:56:20.011Z
Reserved: 2024-02-14T09:18:43.246Z
Link: CVE-2024-26012
Vulnrichment
Updated: 2025-01-15T14:56:15.487Z
NVD
Status : Received
Published: 2025-01-14T14:15:28.893
Modified: 2025-01-14T14:15:28.893
Link: CVE-2024-26012
Redhat
No data.