CVE-2023-42790

A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:23

Type Values Removed Values Added
References () https://fortiguard.com/psirt/FG-IR-23-328 - () https://fortiguard.com/psirt/FG-IR-23-328 -

19 Mar 2024, 08:15

Type Values Removed Values Added
References
  • {'url': 'https://fortiguard.com/psirt/FG-IR-23-327', 'name': 'https://fortiguard.com/psirt/FG-IR-23-327', 'tags': ['Vendor Advisory'], 'refsource': ''}
  • () https://fortiguard.com/psirt/FG-IR-23-328 -

15 Mar 2024, 15:16

Type Values Removed Values Added
References () https://fortiguard.com/psirt/FG-IR-23-327 - () https://fortiguard.com/psirt/FG-IR-23-327 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CPE cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
First Time Fortinet
Fortinet fortios
Fortinet fortiproxy

12 Mar 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-12 15:15

Updated : 2024-11-21 08:23


NVD link : CVE-2023-42790

Mitre link : CVE-2023-42790

CVE.ORG link : CVE-2023-42790


JSON object : View

Products Affected

fortinet

  • fortios
  • fortiproxy
CWE
CWE-121

Stack-based Buffer Overflow