Home

Description

A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.

PUBLISHED Reserved 2024-08-27 | Published 2025-03-11 | Updated 2026-02-26 | Assigner fortinet




HIGH: 7.0CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

1.4.0 (semver)
affected

1.3.0 (semver)
affected

1.2.0
affected

1.1.0 (semver)
affected

1.0.0 (semver)
affected

Default status
unaffected

7.6.0
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

Default status
unaffected

7.6.0
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

Default status
unaffected

1.4.0 (semver)
affected

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

6.2.0 (semver)
affected

References

fortiguard.fortinet.com/psirt/FG-IR-24-325

cve.org (CVE-2024-45324)

nvd.nist.gov (CVE-2024-45324)

Download JSON