A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-23-356 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Aug 2024, 02:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
References | () https://fortiguard.fortinet.com/psirt/FG-IR-23-356 - Vendor Advisory | |
First Time |
Fortinet fortios
Fortinet |
|
CPE | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jun 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-11 15:15
Updated : 2024-08-23 02:42
NVD link : CVE-2023-46720
Mitre link : CVE-2023-46720
CVE.ORG link : CVE-2023-46720
JSON object : View
Products Affected
fortinet
- fortios