Severity
9.8CRITICAL
EPSS
0.2%
top 62.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 14

Description

A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 2.2 | Impact: 3.4

Affected Packages6 packages

NVDfortinet/fortimanager_cloud6.4.17.0.12+2
NVDfortinet/fortianalyzer_cloud6.4.17.0.12+2
NVDfortinet/fortimanager6.4.06.4.15+3
NVDfortinet/fortianalyzer6.4.06.4.15+3
CVEListV5fortinet/fortimanager7.4.07.4.3+3

🔴Vulnerability Details

2
CVEList
CVE-2024-35276: A stack-based buffer overflow in Fortinet FortiAnalyzer versions 72025-01-14
GHSA
GHSA-p469-jgv4-q322: A stack-based buffer overflow in Fortinet FortiAnalyzer versions 72025-01-14

📋Vendor Advisories

1
Fortinet
Stack based buffer overflow in httpd2025-01-14
CVE-2024-35276 (CRITICAL CVSS 9.8) | A stack-based buffer overflow in Fo | cvebase.io