CVE-2023-29181

A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted command.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*

History

10 Dec 2024, 19:07

Type Values Removed Values Added
First Time Fortinet
Fortinet fortios
Fortinet fortiproxy
Fortinet fortipam
CPE cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
References () https://fortiguard.com/psirt/FG-IR-23-119 - () https://fortiguard.com/psirt/FG-IR-23-119 - Vendor Advisory

21 Nov 2024, 07:56

Type Values Removed Values Added
References () https://fortiguard.com/psirt/FG-IR-23-119 - () https://fortiguard.com/psirt/FG-IR-23-119 -

22 Feb 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-22 10:15

Updated : 2024-12-10 19:07


NVD link : CVE-2023-29181

Mitre link : CVE-2023-29181

CVE.ORG link : CVE-2023-29181


JSON object : View

Products Affected

fortinet

  • fortios
  • fortipam
  • fortiproxy
CWE
CWE-134

Use of Externally-Controlled Format String