A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specially crafted packets.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-036 | Vendor Advisory |
https://fortiguard.fortinet.com/psirt/FG-IR-24-036 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
11 Dec 2024, 19:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fortinet fortipam
Fortinet fortiswitchmanager Fortinet fortiproxy Fortinet fortios Fortinet |
|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-036 - Vendor Advisory | |
CWE | CWE-787 | |
CPE | cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-036 - |
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jun 2024, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-11 15:16
Updated : 2024-12-11 19:54
NVD link : CVE-2024-26010
Mitre link : CVE-2024-26010
CVE.ORG link : CVE-2024-26010
JSON object : View
Products Affected
fortinet
- fortipam
- fortiproxy
- fortios
- fortiswitchmanager