Fortinet Fortios vulnerabilities
268 known vulnerabilities affecting fortinet/fortios.
Total CVEs
268
CISA KEV
18
actively exploited
Public exploits
19
Exploited in wild
13
Severity breakdown
CRITICAL25HIGH84MEDIUM149LOW10
Vulnerabilities
Page 5 of 14
CVE-2020-12819HIGHCVSS 7.5fixed in 5.6.13≥ 6.0.0, < 6.0.11+6 more2024-12-19
CVE-2020-12819 [HIGH] CWE-122 CVE-2020-12819: A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in Fo
A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically
cvelistv5nvd
CVE-2020-12820HIGHCVSS 8.8fixed in 5.6.13≥ 6.0.0, < 6.0.11+2 more2024-12-19
CVE-2020-12820 [HIGH] CWE-121 CVE-2020-12820: Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below,
Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code
cvelistv5nvd
CVE-2024-26011CRITICALCVSS 9.8≥ 6.0.0, < 7.0.15≥ 7.2.0, < 7.2.8+7 more2024-11-12
CVE-2024-26011 [CRITICAL] CWE-306 CVE-2024-26011: A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2,
A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 throug
cvelistv5nvd
CVE-2023-50176HIGHCVSS 8.8≥ 7.0.0, < 7.0.14≥ 7.2.0, < 7.2.8+4 more2024-11-12
CVE-2023-50176 [HIGH] CWE-384 CVE-2023-50176: A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0
A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.13 allows attacker to execute unauthorized code or commands via phishing SAML authentication link.
cvelistv5nvd
CVE-2024-33510MEDIUMCVSS 4.3≥ 7.0.0, < 7.2.9≥ 7.4.0, < 7.4.4+3 more2024-11-12
CVE-2024-33510 [MEDIUM] CWE-358 CVE-2024-33510: An improper neutralization of special elements in output used by a downstream component ('Injection'
An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.16 and below; FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below; FortiSASE version 24.2.b SSL-VPN web user interface
cvelistv5nvd
CVE-2022-45862HIGHCVSS 8.8≥ 6.4.0, < 7.2.6≥ 7.2.0, ≤ 7.2.5+2 more2024-08-13
CVE-2022-45862 [HIGH] CWE-613 CVE-2022-45862: An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below,
An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use w
cvelistv5nvd
CVE-2024-36505MEDIUMCVSS 5.5≥ 6.4.13, ≤ 6.4.15≥ 7.0.12, < 7.0.15+5 more2024-08-13
CVE-2024-36505 [MEDIUM] CWE-284 CVE-2024-36505: An improper access control vulnerability [CWE-284] in FortiOS 7.4.0 through 7.4.3, 7.2.5 through 7.2
An improper access control vulnerability [CWE-284] in FortiOS 7.4.0 through 7.4.3, 7.2.5 through 7.2.7, 7.0.12 through 7.0.14 and 6.4.x may allow an attacker who has already successfully obtained write access to the underlying system (via another hypothetical exploit) to bypass the file integrity checking system.
cvelistv5nvd
CVE-2024-26015MEDIUMCVSS 4.7≥ 7.0.0, ≤ 7.0.15≥ 7.2.0, ≤ 7.2.8+1 more2024-07-09
CVE-2024-26015 [MEDIUM] CWE-1389 CVE-2024-26015: An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiProxy versio
An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiProxy version 7.4.3 and below, version 7.2.10 and below, version 7.0.17 and below and FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.15 and below IP address validation feature may permit an unauthenticated attacker to bypass the IP blockli
cvelistv5nvd
CVE-2023-46720HIGHCVSS 7.8≥ 6.0.13, ≤ 6.0.18≥ 6.2.9, ≤ 6.2.16+6 more2024-06-11
CVE-2023-46720 [HIGH] CWE-121 CVE-2023-46720: A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.
A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands.
cvelistv5nvd
CVE-2024-23110HIGHCVSS 7.8≥ 6.0.0, < 6.2.16≥ 6.4.0, < 6.4.15+9 more2024-06-11
CVE-2024-23110 [HIGH] CWE-121 CVE-2024-23110: A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6,
A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands
cvelistv5nvd
CVE-2024-26010HIGHCVSS 7.5≥ 6.0.0, < 7.0.15≥ 7.2.0, < 7.2.8+7 more2024-06-11
CVE-2024-26010 [HIGH] CWE-121 CVE-2024-26010: A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through
A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18,
cvelistv5nvd
CVE-2024-23111MEDIUMCVSS 4.8≥ 7.0.0, < 7.0.14≥ 7.2.0, < 7.2.8+4 more2024-06-11
CVE-2024-23111 [MEDIUM] CWE-79 CVE-2024-23111: An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerabilit
An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions reboot page may allow a remote privileged attacker with super-admin access to execute JavaScrip
cvelistv5nvd
CVE-2024-21754MEDIUMCVSS 4.4≥ 6.4.0, ≤ 6.4.15≥ 7.0.0, ≤ 7.0.15+4 more2024-06-11
CVE-2024-21754 [MEDIUM] CWE-916 CVE-2024-21754: A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting Fort
A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to d
cvelistv5nvd
CVE-2023-44247HIGHCVSS 7.2≥ 6.2.0, ≤ 6.2.16≥ 6.4.0, ≤ 6.4.152024-05-14
CVE-2023-44247 [HIGH] CWE-415 CVE-2023-44247: A double free vulnerability [CWE-415] vulnerability in Fortinet FortiOS 6.4 all versions may allow a
A double free vulnerability [CWE-415] vulnerability in Fortinet FortiOS 6.4 all versions may allow a privileged attacker to execute code or commands via crafted HTTP or HTTPs requests.
cvelistv5nvd
CVE-2023-45583HIGHCVSS 7.2fixed in 7.2.6≥ 6.2.0, ≤ 6.2.16+4 more2024-05-14
CVE-2023-45583 [HIGH] CWE-134 CVE-2023-45583: A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.
A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchMan
cvelistv5nvd
CVE-2024-26007HIGHCVSS 7.5v7.4.12024-05-14
CVE-2024-26007 [HIGH] CWE-703 CVE-2024-26007: An improper check or handling of exceptional conditions vulnerability [CWE-703] in Fortinet FortiOS
An improper check or handling of exceptional conditions vulnerability [CWE-703] in Fortinet FortiOS version 7.4.1 allows an unauthenticated attacker to provoke a denial of service on the administrative interface via crafted HTTP requests.
cvelistv5nvd
CVE-2023-46714HIGHCVSS 7.2≥ 7.2.1, ≤ 7.2.6v7.4.0+2 more2024-05-14
CVE-2023-46714 [HIGH] CWE-121 CVE-2023-46714: A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.1 through 7.2.
A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.1 through 7.2.6 and version 7.4.0 through 7.4.1 allows a privileged attacker over the administrative interface to execute arbitrary code or commands via crafted HTTP or HTTPs requests.
cvelistv5nvd
CVE-2023-45586MEDIUMCVSS 5.0≥ 6.2.0, ≤ 6.2.16≥ 6.4.0, ≤ 6.4.15+7 more2024-05-14
CVE-2023-45586 [MEDIUM] CWE-345 CVE-2023-45586: An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VP
An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not rece
cvelistv5nvd
CVE-2023-36640MEDIUMCVSS 6.7≥ 6.0.0, ≤ 6.0.16≥ 6.2.0, ≤ 6.2.16+3 more2024-05-14
CVE-2023-36640 [MEDIUM] CWE-134 CVE-2023-36640: A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.
A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.
cvelistv5nvd
CVE-2023-41677HIGHCVSS 8.8≥ 6.0.0, < 6.2.16≥ 6.4.0, < 6.4.15+9 more2024-04-09
CVE-2023-41677 [HIGH] CWE-522 CVE-2023-41677: A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 thro
A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows at
cvelistv5nvd