Vulnerability Details CVE-2024-23113
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.45
EPSS Ranking 97.4%
CVSS Severity
CVSS v3 Score 9.8
Proposed Action
Fortinet FortiOS, FortiPAM, FortiProxy, and FortiWeb contain a format string vulnerability that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
Ransomware Campaign
Unknown
Products affected by CVE-2024-23113
-
cpe:2.3:a:fortinet:fortiproxy:7.0.0
-
cpe:2.3:a:fortinet:fortiproxy:7.0.1
-
cpe:2.3:a:fortinet:fortiproxy:7.0.10
-
cpe:2.3:a:fortinet:fortiproxy:7.0.11
-
cpe:2.3:a:fortinet:fortiproxy:7.0.12
-
cpe:2.3:a:fortinet:fortiproxy:7.0.13
-
cpe:2.3:a:fortinet:fortiproxy:7.0.14
-
cpe:2.3:a:fortinet:fortiproxy:7.0.2
-
cpe:2.3:a:fortinet:fortiproxy:7.0.3
-
cpe:2.3:a:fortinet:fortiproxy:7.0.4
-
cpe:2.3:a:fortinet:fortiproxy:7.0.5
-
cpe:2.3:a:fortinet:fortiproxy:7.0.6
-
cpe:2.3:a:fortinet:fortiproxy:7.0.7
-
cpe:2.3:a:fortinet:fortiproxy:7.0.8
-
cpe:2.3:a:fortinet:fortiproxy:7.0.9
-
cpe:2.3:a:fortinet:fortiproxy:7.2.0
-
cpe:2.3:a:fortinet:fortiproxy:7.2.1
-
cpe:2.3:a:fortinet:fortiproxy:7.2.2
-
cpe:2.3:a:fortinet:fortiproxy:7.2.3
-
cpe:2.3:a:fortinet:fortiproxy:7.2.4
-
cpe:2.3:a:fortinet:fortiproxy:7.2.5
-
cpe:2.3:a:fortinet:fortiproxy:7.2.6
-
cpe:2.3:a:fortinet:fortiproxy:7.2.7
-
cpe:2.3:a:fortinet:fortiproxy:7.2.8
-
cpe:2.3:a:fortinet:fortiproxy:7.4.0
-
cpe:2.3:a:fortinet:fortiproxy:7.4.1
-
cpe:2.3:a:fortinet:fortiproxy:7.4.2
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.0.0
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.0.1
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.0.2
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.0.3
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.2.1
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.2.2
-
cpe:2.3:a:fortinet:fortiswitchmanager:7.2.3
-
cpe:2.3:o:fortinet:fortios:7.0.0
-
cpe:2.3:o:fortinet:fortios:7.0.1
-
cpe:2.3:o:fortinet:fortios:7.0.10
-
cpe:2.3:o:fortinet:fortios:7.0.11
-
cpe:2.3:o:fortinet:fortios:7.0.12
-
cpe:2.3:o:fortinet:fortios:7.0.13
-
cpe:2.3:o:fortinet:fortios:7.0.2
-
cpe:2.3:o:fortinet:fortios:7.0.3
-
cpe:2.3:o:fortinet:fortios:7.0.4
-
cpe:2.3:o:fortinet:fortios:7.0.5
-
cpe:2.3:o:fortinet:fortios:7.0.6
-
cpe:2.3:o:fortinet:fortios:7.0.7
-
cpe:2.3:o:fortinet:fortios:7.0.8
-
cpe:2.3:o:fortinet:fortios:7.0.9
-
cpe:2.3:o:fortinet:fortios:7.2.0
-
cpe:2.3:o:fortinet:fortios:7.2.1
-
cpe:2.3:o:fortinet:fortios:7.2.2
-
cpe:2.3:o:fortinet:fortios:7.2.3
-
cpe:2.3:o:fortinet:fortios:7.2.4
-
cpe:2.3:o:fortinet:fortios:7.2.5
-
cpe:2.3:o:fortinet:fortios:7.2.6
-
cpe:2.3:o:fortinet:fortios:7.4.0
-
cpe:2.3:o:fortinet:fortios:7.4.1
-
cpe:2.3:o:fortinet:fortios:7.4.2
-
cpe:2.3:o:fortinet:fortipam:1.0.0
-
cpe:2.3:o:fortinet:fortipam:1.0.1
-
cpe:2.3:o:fortinet:fortipam:1.0.2
-
cpe:2.3:o:fortinet:fortipam:1.0.3
-
cpe:2.3:o:fortinet:fortipam:1.1.0
-
cpe:2.3:o:fortinet:fortipam:1.1.1
-
cpe:2.3:o:fortinet:fortipam:1.2.0