Fortinet Fortios vulnerabilities

268 known vulnerabilities affecting fortinet/fortios.

Total CVEs
268
CISA KEV
18
actively exploited
Public exploits
19
Exploited in wild
13
Severity breakdown
CRITICAL25HIGH84MEDIUM149LOW10

Vulnerabilities

Page 6 of 14
CVE-2024-23662HIGHCVSS 7.5≥ 6.4.0, < 7.2.6≥ 7.4.0, < 7.4.2+4 more2024-04-09
CVE-2024-23662 [HIGH] CWE-200 CVE-2024-23662: An exposure of sensitive information to an unauthorized actor in Fortinet FortiOS at least version a An exposure of sensitive information to an unauthorized actor in Fortinet FortiOS at least version at least 7.4.0 through 7.4.1 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.15 and 6.4.0 through 6.4.15 allows attacker to information disclosure via HTTP requests.
cvelistv5nvd
CVE-2023-48784MEDIUMCVSS 6.7≥ 6.4.0, < 7.0.16≥ 7.2.0, < 7.2.8+5 more2024-04-09
CVE-2023-48784 [MEDIUM] CWE-134 CVE-2023-48784: A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.1 and be A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.1 and below, version 7.2.7 and below, 7.0 all versions, 6.4 all versions command line interface may allow a local privileged attacker with super-admin profile and CLI access to execute arbitrary code or commands via specially crafted requests.
cvelistv5nvd
CVE-2023-42789CRITICALCVSS 9.8≥ 6.2.0, ≤ 6.2.15≥ 6.4.0, ≤ 6.4.14+5 more2024-03-12
CVE-2023-42789 [CRITICAL] CWE-787 CVE-2023-42789: A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7. A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
cvelistv5nvd
CVE-2023-46717HIGHCVSS 8.8≥ 7.0.0, < 7.0.13≥ 7.2.0, < 7.2.7+4 more2024-03-12
CVE-2023-46717 [HIGH] CWE-287 CVE-2023-46717: An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2 An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2.6 and below, and versions 7.0.12 and below when configured with FortiAuthenticator in HA may allow a readonly user to gain read-write access via successive login attempts.
cvelistv5nvd
CVE-2023-42790HIGHCVSS 8.1≥ 6.2.0, ≤ 6.2.15≥ 6.4.0, ≤ 6.4.14+3 more2024-03-12
CVE-2023-42790 [HIGH] CWE-121 CVE-2023-42790: A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 th A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
cvelistv5nvd
CVE-2024-23112MEDIUMCVSS 4.3≥ 6.4.7, ≤ 6.4.14≥ 7.0.1, ≤ 7.0.13+2 more2024-03-12
CVE-2024-23112 [MEDIUM] CWE-639 CVE-2024-23112: An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmar
cvelistv5nvd
CVE-2023-29181HIGHCVSS 8.8≥ 6.0.0, < 6.2.15≥ 6.4.0, < 6.4.13+15 more2024-02-22
CVE-2023-29181 [HIGH] CWE-134 CVE-2023-29181: A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through A use of externally-controlled format string in Fortinet FortiOS 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM 1.0.0 through 1.0.3 allows atta
cvelistv5nvd
CVE-2023-29180HIGHCVSS 7.5≥ 6.0.0, < 6.0.17≥ 6.2.0, < 6.2.15+8 more2024-02-22
CVE-2023-29180 [HIGH] CWE-476 CVE-2023-29180: A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6. A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.14, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.3, 7.0.0 through 7.0.10, 2.0.0 through 2.0.12, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to denial of service via specially
cvelistv5nvd
CVE-2023-29179MEDIUMCVSS 6.5≥ 6.4.0, < 6.4.13≥ 7.0.0, < 7.0.12+4 more2024-02-22
CVE-2023-29179 [MEDIUM] CWE-476 CVE-2023-29179: A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6. A null pointer dereference in Fortinet FortiOS version 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, Fortiproxy version 7.2.0 through 7.2.4, 7.0.0 through 7.0.10 allows attacker to denial of service via specially crafted HTTP requests.
cvelistv5nvd
CVE-2024-23113CRITICALCVSS 9.8KEV≥ 7.0.0, ≤ 7.0.13≥ 7.2.0, ≤ 7.2.6+1 more2024-02-15
CVE-2024-23113 [CRITICAL] CWE-134 CVE-2024-23113: A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 throu
cvelistv5nvd
CVE-2023-47537MEDIUMCVSS 4.8≥ 7.0.0, < 7.0.14≥ 7.2.0, ≤ 7.2.6+5 more2024-02-15
CVE-2023-47537 [MEDIUM] CWE-295 CVE-2023-47537: An improper certificate validation vulnerability in Fortinet FortiOS 7.4.0 through 7.4.1, FortiOS 7. An improper certificate validation vulnerability in Fortinet FortiOS 7.4.0 through 7.4.1, FortiOS 7.2.0 through 7.2.6, FortiOS 7.0.0 through 7.0.15, FortiOS 6.4 all versions allows a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the FortiLink communication channel between the FortiOS device and FortiSwitch.
cvelistv5nvd
CVE-2024-21762CRITICALCVSS 9.8KEV≥ 6.0.0, < 6.0.18≥ 6.2.0, < 6.2.16+10 more2024-02-09
CVE-2024-21762 [CRITICAL] CWE-787 CVE-2024-21762: A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 t A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7
cvelistv5nvd
CVE-2023-44250HIGHCVSS 8.8v7.2.5v7.4.0+2 more2024-01-10
CVE-2023-44250 [HIGH] CWE-269 CVE-2023-44250: An improper privilege management vulnerability [CWE-269] in a Fortinet FortiOS HA cluster version 7. An improper privilege management vulnerability [CWE-269] in a Fortinet FortiOS HA cluster version 7.4.0 through 7.4.1 and 7.2.5 and in a FortiProxy HA cluster version 7.4.0 through 7.4.1 allows an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.
cvelistv5nvd
CVE-2023-36639HIGHCVSS 8.8≥ 6.0.0, ≤ 6.0.17≥ 6.2.0, ≤ 6.2.15+4 more2023-12-13
CVE-2023-36639 [HIGH] CWE-134 CVE-2023-36639: A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7. A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, FortiOS versions 7.4.0, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiPAM versions 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via s
cvelistv5nvd
CVE-2023-41678HIGHCVSS 8.8v7.0.0v7.0.1+5 more2023-12-13
CVE-2023-41678 [HIGH] CWE-415 CVE-2023-41678: A double free in Fortinet FortiOS versions 7.0.0 through 7.0.5, FortiPAM version 1.0.0 through 1.0.3 A double free in Fortinet FortiOS versions 7.0.0 through 7.0.5, FortiPAM version 1.0.0 through 1.0.3, 1.1.0 through 1.1.1 allows attacker to execute unauthorized code or commands via specifically crafted request.
cvelistv5nvd
CVE-2023-47536MEDIUMCVSS 5.3≥ 6.4.0, ≤ 6.4.14≥ 7.0.0, ≤ 7.0.13+1 more2023-12-13
CVE-2023-47536 [MEDIUM] CWE-284 CVE-2023-47536: An improper access control vulnerability [CWE-284] in FortiOS version 7.2.0, version 7.0.13 and belo An improper access control vulnerability [CWE-284] in FortiOS version 7.2.0, version 7.0.13 and below, version 6.4.14 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below may allow a remote unauthenticated attacker to bypass the firewall deny geolocalisation policy via timing the bypass with a GeoIP dat
cvelistv5nvd
CVE-2023-36641MEDIUMCVSS 6.5≥ 6.0.0, ≤ 6.0.17≥ 6.2.0, ≤ 6.2.15+4 more2023-11-14
CVE-2023-36641 [MEDIUM] CWE-197 CVE-2023-36641: A numeric truncation error in Fortinet FortiProxy version 7.2.0 through 7.2.4, FortiProxy version 7. A numeric truncation error in Fortinet FortiProxy version 7.2.0 through 7.2.4, FortiProxy version 7.0.0 through 7.0.10, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1, all versions, FortiProxy 1.0 all versions, FortiOS version 7.4.0, FortiOS version 7.2.0 through 7.2.5, FortiOS version 7.0.0 through 7.0.12, FortiOS 6.4 all
cvelistv5nvd
CVE-2023-28002MEDIUMCVSS 6.7≥ 6.0.0, ≤ 6.0.17≥ 6.2.0, ≤ 6.2.15+3 more2023-11-14
CVE-2023-28002 [MEDIUM] CWE-354 CVE-2023-28002: An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2 An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.12, 6.4 all versions, 6.2 all versions, 6.0 all versions and VMs may allow a local attacker with admin privileges to boot a malicious image on the device and bypass the filesystem integrity check in place.
cvelistv5nvd
CVE-2023-37935HIGHCVSS 7.5≥ 7.0.0, ≤ 7.0.12≥ 7.2.0, ≤ 7.2.5+1 more2023-10-10
CVE-2023-37935 [HIGH] CWE-598 CVE-2023-37935: A use of GET request method with sensitive query strings vulnerability in Fortinet FortiOS 7.0.0 - 7 A use of GET request method with sensitive query strings vulnerability in Fortinet FortiOS 7.0.0 - 7.0.12, 7.2.0 - 7.2.5 and 7.4.0 allows an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services.
cvelistv5nvd
CVE-2023-41841HIGHCVSS 8.8≥ 7.0.0, ≤ 7.0.11≥ 7.2.0, ≤ 7.2.42023-10-10
CVE-2023-41841 [HIGH] CWE-285 CVE-2023-41841: An improper authorization vulnerability in Fortinet FortiOS 7.0.0 - 7.0.11 and 7.2.0 - 7.2.4 allows An improper authorization vulnerability in Fortinet FortiOS 7.0.0 - 7.0.11 and 7.2.0 - 7.2.4 allows an attacker belonging to the prof-admin profile to perform elevated actions.
cvelistv5nvd