A use of externally-controlled format string in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.2 through 7.2.5 allows attacker to escalate its privileges via specially crafted requests.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-196 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Oct 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-196 - Vendor Advisory | |
First Time |
Fortinet fortianalyzer
Fortinet Fortinet fortianalyzer Cloud |
|
CPE | cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo |
10 Oct 2024, 12:56
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-08 15:15
Updated : 2024-10-19 00:41
NVD link : CVE-2024-45330
Mitre link : CVE-2024-45330
CVE.ORG link : CVE-2024-45330
JSON object : View
Products Affected
fortinet
- fortianalyzer
- fortianalyzer_cloud
CWE