An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiDDoS-F version 7.0.0 through 7.02 and before 6.6.3 may allow a privileged attacker to execute unauthorized code or commands via crafted CLI requests.
Fixes

Solution

Please upgrade to FortiDDoS-F version 7.2.0 or above Please upgrade to FortiDDoS-F version 7.0.3 or above


Workaround

No workaround given by the vendor.

History

Tue, 09 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
Description An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiDDoS-F version 7.0.0 through 7.02 and before 6.6.3 may allow a privileged attacker to execute unauthorized code or commands via crafted CLI requests.
First Time appeared Fortinet
Fortinet fortiddos-f
Weaknesses CWE-78
CPEs cpe:2.3:o:fortinet:fortiddos-f:6.1.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.1.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.1.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.1.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.1.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.1.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.3.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.3.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.3.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.3.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.3.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.3.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.6.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.6.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.6.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:6.6.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortiddos-f:7.0.2:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiddos-f
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-09-09T14:11:17.710Z

Reserved: 2024-08-27T06:43:07.250Z

Link: CVE-2024-45325

cve-icon Vulnrichment

Updated: 2025-09-09T14:11:14.507Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-09T14:15:40.963

Modified: 2025-09-09T16:28:43.660

Link: CVE-2024-45325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.