Severity
7.5HIGH
EPSS
0.2%
top 53.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11

Description

A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6,

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages8 packages

NVDfortinet/fortios6.0.07.0.15+2
NVDfortinet/fortiproxy1.0.07.0.17+2
NVDfortinet/fortiswitchmanager7.0.17.0.4+1
CVEListV5fortinet/fortios7.4.07.4.3+5
CVEListV5fortinet/fortipam1.1.01.1.2+2

🔴Vulnerability Details

2
CVEList
CVE-2024-26010: A stack-based buffer overflow in Fortinet FortiPAM version 12024-06-11
GHSA
GHSA-f58x-r563-jp48: A stack-based buffer overflow in Fortinet FortiPAM version 12024-06-11

📋Vendor Advisories

1
Fortinet
Buffer overflow in fgfmd2024-06-11
CVE-2024-26010 (HIGH CVSS 7.5) | A stack-based buffer overflow in Fo | cvebase.io