Home

Description

Multiple improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2 7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 and 5.6.0 through 5.6.11 and 5.4.0 through 5.4.7 and 5.2.0 through 5.2.10 and 5.0.0 through 5.0.12 and 4.3.4 through 4.3.8 allows attacker to execute unauthorized code or commands via crafted CLI requests.

PUBLISHED Reserved 2024-04-11 | Published 2025-03-11 | Updated 2026-02-26 | Assigner fortinet




MEDIUM: 6.5CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:X

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

6.2.0 (semver)
affected

6.0.0 (semver)
affected

5.6.0 (semver)
affected

5.4.0 (semver)
affected

5.2.0 (semver)
affected

5.0.0 (semver)
affected

4.3.4 (semver)
affected

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

6.2.0 (semver)
affected

References

fortiguard.com/psirt/FG-IR-24-124

cve.org (CVE-2024-32123)

nvd.nist.gov (CVE-2024-32123)

Download JSON