Vulnerability Details CVE-2023-34992
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.763
EPSS Ranking 98.9%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2023-34992
-
cpe:2.3:a:fortinet:fortisiem:6.4.0
-
cpe:2.3:a:fortinet:fortisiem:6.4.1
-
cpe:2.3:a:fortinet:fortisiem:6.4.2
-
cpe:2.3:a:fortinet:fortisiem:6.5.0
-
cpe:2.3:a:fortinet:fortisiem:6.5.1
-
cpe:2.3:a:fortinet:fortisiem:6.6.0
-
cpe:2.3:a:fortinet:fortisiem:6.6.1
-
cpe:2.3:a:fortinet:fortisiem:6.6.2
-
cpe:2.3:a:fortinet:fortisiem:6.6.3
-
cpe:2.3:a:fortinet:fortisiem:6.7.0
-
cpe:2.3:a:fortinet:fortisiem:6.7.1
-
cpe:2.3:a:fortinet:fortisiem:6.7.2
-
cpe:2.3:a:fortinet:fortisiem:6.7.3
-
cpe:2.3:a:fortinet:fortisiem:6.7.4
-
cpe:2.3:a:fortinet:fortisiem:6.7.5
-
cpe:2.3:a:fortinet:fortisiem:7.0.0