Home

Description

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.

PUBLISHED Reserved 2020-05-12 | Published 2024-12-19 | Updated 2024-12-20 | Assigner fortinet




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:U/RL:X/RC:X

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

6.0.0 (semver)
affected

5.6.0 (semver)
affected

References

fortiguard.fortinet.com/psirt/FG-IR-20-083

cve.org (CVE-2020-12820)

nvd.nist.gov (CVE-2020-12820)

Download JSON