⚠ Actively exploited
Added to CISA KEV on 2024-10-09. Federal agencies required to patch by 2024-10-30. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..
CVE-2024-23113
Severity
9.8CRITICAL
EPSS
57.5%
top 1.84%
CISA KEV
KEV
Added 2024-10-09
Due 2024-10-30
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 15
KEV addedOct 9
KEV dueOct 30
Latest updateNov 18
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Description
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages8 packages
🔴Vulnerability Details
3🔍Detection Rules
3Suricata▶
ET EXPLOIT Fortinet FGFM Arbitrary Code Execution via Externally-Controlled Format String (CVE-2024-23113)↗2024-10-18