Impact
A stack-based buffer overflow flaw allows an attacker who can authenticate and bypass stack protection and address space layout randomization to gain arbitrary code execution on FortiWeb devices. The vulnerability is a classic buffer overflow (CWE‑121) and can lead to full system compromise if exploited. The impact can affect confidentiality, integrity, and availability of the protected resources running on the web application firewall.
Affected Systems
Fortinet FortiWeb versions 8.0.0 through 8.0.3, 7.6.0 through 7.6.6, 7.4.0 through 7.4.11, all 7.2 releases, and all 7.0 releases are vulnerable. Any FortiWeb deployment within these version ranges is at risk unless already patched to the newer releases.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity. The EPSS score of less than 1% suggests that widespread exploitation is unlikely at this time, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is a remote, authenticated attacker transmitting crafted HTTP requests. The requirement to bypass stack protection and ASLR reduces immediate exploitation difficulty compared to unmitigated buffer overflows, but once bypassed, the attacker can execute arbitrary code. Given the moderate score and low exploit probability, organizations should promptly apply the vendor‑issued patches to mitigate the risk.
OpenCVE Enrichment