A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-260 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
31 Jan 2025, 17:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://fortiguard.com/psirt/FG-IR-23-260 - Vendor Advisory | |
First Time |
Fortinet
Fortinet fortiswitch |
|
CPE | cpe:2.3:o:fortinet:fortiswitch:7.4.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortiswitch:*:*:*:*:*:*:*:* |
|
CWE | CWE-798 |
14 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 14:15
Updated : 2025-01-31 17:42
NVD link : CVE-2023-37936
Mitre link : CVE-2023-37936
CVE.ORG link : CVE-2023-37936
JSON object : View
Products Affected
fortinet
- fortiswitch