CVE-2023-41842
12.03.2024, 15:15
A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.Enginsight
Vendor | Product | Version |
---|---|---|
fortinet | fortimanager | 7.4.1 ≤ 𝑥 ≤ 7.4.1 |
fortinet | fortimanager | 7.2.3 ≤ 𝑥 ≤ 7.2.3 |
fortinet | fortimanager | 7.0.9 ≤ 𝑥 ≤ 7.0.9 |
fortinet | fortimanager | 6.4.14 ≤ 𝑥 ≤ 6.4.14 |
fortinet | fortimanager | 6.2.12 ≤ 𝑥 ≤ 6.2.12 |
fortinet | fortianalyzer | 7.4.1 ≤ 𝑥 ≤ 7.4.1 |
fortinet | fortianalyzer | 7.2.3 ≤ 𝑥 ≤ 7.2.3 |
fortinet | fortianalyzer | 6.4.14 ≤ 𝑥 ≤ 6.4.14 |
fortinet | fortianalyzer | 6.2.12 ≤ 𝑥 ≤ 6.2.12 |
fortinet | fortiportal | 6.0.14 ≤ 𝑥 ≤ 6.0.14 |
fortinet | fortiportal | 5.3.8 ≤ 𝑥 ≤ 5.3.8 |
fortinet | fortianalyzer | 6.2.0 ≤ 𝑥 < 7.0.10 |
fortinet | fortianalyzer | 7.2.0 ≤ 𝑥 < 7.2.4 |
fortinet | fortianalyzer | 7.4.0 ≤ 𝑥 < 7.4.2 |
fortinet | fortianalyzer_bigdata | 6.4.5 ≤ 𝑥 ≤ 6.4.7 |
fortinet | fortianalyzer_bigdata | 7.0.1 ≤ 𝑥 ≤ 7.0.6 |
fortinet | fortianalyzer_bigdata | 7.2.0 ≤ 𝑥 < 7.2.6 |
fortinet | fortianalyzer_bigdata | 6.2.5 |
fortinet | fortimanager | 6.2.0 ≤ 𝑥 < 7.0.10 |
fortinet | fortimanager | 7.2.0 ≤ 𝑥 < 7.2.4 |
fortinet | fortimanager | 7.4.0 ≤ 𝑥 < 7.4.2 |
fortinet | fortiportal | 5.3.0 ≤ 𝑥 ≤ 6.0.14 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration