CVE-2020-12820Stack-based Buffer Overflow in Fortinet Fortios

Severity
8.8HIGHNVD
CNA5.4
EPSS
4.0%
top 11.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 19

Description

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDfortinet/fortios6.0.06.0.11+1
CVEListV5fortinet/fortios6.0.06.0.10+1

🔴Vulnerability Details

2
GHSA
GHSA-8hp7-6mr2-85pv: Under non-default configuration, a stack-based buffer overflow in FortiOS version 62024-12-19
CVEList
CVE-2020-12820: Under non-default configuration, a stack-based buffer overflow in FortiOS version 62024-12-19

📋Vendor Advisories

1
Fortinet
Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and b...2024-12-19
CVE-2020-12820 — Stack-based Buffer Overflow | cvebase