Fortinet Fortiswitch vulnerabilities

14 known vulnerabilities affecting fortinet/fortiswitch.

Total CVEs
14
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL5HIGH3MEDIUM6

Vulnerabilities

Page 1 of 1
CVE-2024-48887CRITICALCVSS 9.8≥ 6.4.0, < 6.4.15≥ 7.0.0, < 7.0.11+7 more2025-04-08
CVE-2024-48887 [CRITICAL] CWE-620 CVE-2024-48887: A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthent A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request
cvelistv5nvd
CVE-2023-25610CRITICALCVSS 9.8≥ 7.0.0, < 7.0.7≥ 7.2.0, < 7.2.42025-03-24
CVE-2023-25610 [CRITICAL] CWE-124 CVE-2023-25610: A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet F A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.6, version 6.4.0 through 6.4.11 and version 6.2.12 and below, FortiProxy version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.8, version 2.0.12 and below and FortiOS-6K7K version 7.0.5,
nvd
CVE-2022-23439MEDIUMCVSS 6.1≥ 6.4.0, < 7.0.5≥ 7.0.0, ≤ 7.0.4+3 more2025-01-22
CVE-2022-23439 [MEDIUM] CWE-610 CVE-2022-23439: A externally controlled reference to a resource in another sphere vulnerability in Fortinet allows A externally controlled reference to a resource in another sphere vulnerability in Fortinet allows attacker to poison web caches via crafted HTTP requests, where the `Host` header points to an arbitrary webserver
cvelistv5nvd
CVE-2023-37936CRITICALCVSS 9.8≥ 6.0.0, < 6.2.8≥ 6.4.0, < 6.4.14+8 more2025-01-14
CVE-2023-37936 [CRITICAL] CWE-321 CVE-2023-37936: A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests.
cvelistv5nvd
CVE-2023-37937HIGHCVSS 7.8≥ 6.0.0, < 6.2.8≥ 6.4.0, < 6.4.14+8 more2025-01-14
CVE-2023-37937 [HIGH] CWE-78 CVE-2023-37937: An improper neutralization of special elements used in an os command ('os command injection') in For An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via the FortiSwitch CLI.
cvelistv5nvd
CVE-2022-27488HIGHCVSS 8.8≥ 6.0.0, ≤ 6.0.7≥ 6.2.0, ≤ 6.2.7+2 more2023-12-13
CVE-2022-27488 [HIGH] CWE-352 CVE-2022-27488: A cross-site request forgery (CSRF) in Fortinet FortiVoiceEnterprise version 6.4.x, 6.0.x, FortiSwit A cross-site request forgery (CSRF) in Fortinet FortiVoiceEnterprise version 6.4.x, 6.0.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.0 through 6.2.7, 6.0.x, FortiMail version 7.0.0 through 7.0.3, 6.4.0 through 6.4.6, 6.2.x, 6.0.x FortiRecorder version 6.4.0 through 6.4.2, 6.0.x, 2.7.x, 2.6.x, FortiNDR version 1.x.x allows a re
cvelistv5nvd
CVE-2022-27490MEDIUMCVSS 6.5≥ 6.0.0, ≤ 6.0.7≥ 6.2.0, ≤ 6.2.7+2 more2023-03-07
CVE-2022-27490 [MEDIUM] CWE-200 CVE-2022-27490: A exposure of sensitive information to an unauthorized actor in Fortinet FortiManager version 6.0.0 A exposure of sensitive information to an unauthorized actor in Fortinet FortiManager version 6.0.0 through 6.0.4, FortiAnalyzer version 6.0.0 through 6.0.4, FortiPortal version 6.0.0 through 6.0.9, 5.3.0 through 5.3.8, 5.2.x, 5.1.0, 5.0.x, 4.2.x, 4.1.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.x, 6.0.x allows an attacker wh
cvelistv5nvd
CVE-2021-43074MEDIUMCVSS 4.3≥ 6.0.0, < 6.4.11≥ 7.0.0, < 7.0.4+4 more2023-02-16
CVE-2021-43074 [MEDIUM] CWE-347 CVE-2021-43074: An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all vers An improper verification of cryptographic signature vulnerability [CWE-347] in FortiWeb 6.4 all versions, 6.3.16 and below, 6.2 all versions, 6.1 all versions, 6.0 all versions; FortiOS 7.0.3 and below, 6.4.8 and below, 6.2 all versions, 6.0 all versions; FortiSwitch 7.0.3 and below, 6.4.10 and below, 6.2 all versions, 6.0 all versions; FortiProxy 7
cvelistv5nvd
CVE-2021-42755MEDIUMCVSS 4.3≥ 6.0.0, ≤ 6.0.7≥ 6.2.0, ≤ 6.2.7+2 more2022-07-18
CVE-2021-42755 [MEDIUM] CWE-190 CVE-2021-42755: An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and b An integer overflow / wraparound vulnerability [CWE-190] in FortiSwitch 7.0.2 and below, 6.4.9 and below, 6.2.x, 6.0.x; FortiRecorder 6.4.2 and below, 6.0.10 and below; FortiOS 7.0.2 and below, 6.4.8 and below, 6.2.10 and below, 6.0.x; FortiProxy 7.0.0, 2.0.6 and below, 1.2.x, 1.1.x, 1.0.x; FortiVoiceEnterprise 6.4.3 and below, 6.0.10 and below dhcp
nvd
CVE-2021-42757MEDIUMCVSS 6.7≥ 6.0.0, ≤ 6.4.9≥ 7.0.0, ≤ 7.0.3+2 more2021-12-08
CVE-2021-42757 [MEDIUM] CWE-120 CVE-2021-42757: A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 thr A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments.
cvelistv5nvd
CVE-2021-26111MEDIUMCVSS 6.5≤ 3.6.11≥ 6.0.0, ≤ 6.0.6+2 more2021-06-01
CVE-2021-26111 [MEDIUM] CWE-401 CVE-2021-26111: A missing release of memory after effective lifetime vulnerability in FortiSwitch 6.4.0 to 6.4.6, 6. A missing release of memory after effective lifetime vulnerability in FortiSwitch 6.4.0 to 6.4.6, 6.2.0 to 6.2.6, 6.0.0 to 6.0.6, 3.6.11 and below may allow an attacker on an adjacent network to exhaust available memory by sending specifically crafted LLDP/CDP/EDP packets to the device.
nvd
CVE-2019-17657HIGHCVSS 7.5fixed in 3.6.11≥ 6.0.0, < 6.0.6+1 more2020-04-07
CVE-2019-17657 [HIGH] CWE-400 CVE-2019-17657: An Uncontrolled Resource Consumption vulnerability in Fortinet FortiSwitch below 3.6.11, 6.0.6 and 6 An Uncontrolled Resource Consumption vulnerability in Fortinet FortiSwitch below 3.6.11, 6.0.6 and 6.2.2, FortiAnalyzer below 6.2.3, FortiManager below 6.2.3 and FortiAP-S/W2 below 6.2.2 may allow an attacker to cause admin webUI denial of service (DoS) via handling special crafted HTTP requests/responses in pieces slowly, as demonstrated by Slow HTTP
nvd
CVE-2016-4573CRITICALCVSS 9.8v3.4.12016-09-09
CVE-2016-4573 [CRITICAL] CWE-264 CVE-2016-4573: Fortinet FortiSwitch FSW-108D-POE, FSW-124D, FSW-124D-POE, FSW-224D-POE, FSW-224D-FPOE, FSW-248D-POE Fortinet FortiSwitch FSW-108D-POE, FSW-124D, FSW-124D-POE, FSW-224D-POE, FSW-224D-FPOE, FSW-248D-POE, FSW-248D-FPOE, FSW-424D, FSW-424D-POE, FSW-424D-FPOE, FSW-448D, FSW-448D-POE, FSW-448D-FPOE, FSW-524D, FSW-524D-FPOE, FSW-548D, FSW-548D-FPOE, FSW-1024D, FSW-1048D, FSW-3032D, and FSW-R-112D-POE models, when in FortiLink managed mode and upgraded to
nvd
CVE-2016-6909CRITICALCVSS 9.8PoC≤ 3.4.22016-08-24
CVE-2016-6909 [CRITICAL] CWE-119 CVE-2016-6909: Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 allows remote attackers to execute arbitrary code via a crafted HTTP request, aka EGREGIOUSBLUNDER.
nvd