CVE-2023-36640Use of Externally-Controlled Format String in Fortinet Fortios

Severity
6.7MEDIUMNVD
EPSS
0.1%
top 75.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 14

Description

A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.8 | Impact: 5.9

Affected Packages6 packages

CVEListV5fortinet/fortios7.0.07.0.12+4
NVDfortinet/fortios6.0.06.0.16+4
CVEListV5fortinet/fortipam1.0.01.0.3
CVEListV5fortinet/fortiproxy7.2.07.2.4+5

🔴Vulnerability Details

2
CVEList
CVE-2023-36640: A use of externally-controlled format string in Fortinet FortiProxy versions 72024-05-14
GHSA
GHSA-r7v6-m227-rm4x: A use of externally-controlled format string in Fortinet FortiProxy versions 72024-05-14

📋Vendor Advisories

1
Fortinet
Format String Bug in cli command2024-05-14
CVE-2023-36640 — Fortinet Fortios vulnerability | cvebase