Home

Description

A heap-based buffer overflow in Fortinet FortiOS 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, FortiManager Cloud 7.6.2, 7.4.1 through 7.4.5, 7.2.1 through 7.2.8, 7.0.1 through 7.0.13, 6.4.1 through 6.4.7, FortiAnalyzer Cloud 7.4.1 through 7.4.5, 7.2.1 through 7.2.8, 7.0.1 through 7.0.13, 6.4.1 through 6.4.7, FortiProxy 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.12, 7.0.0 through 7.0.19, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiAnalyzer 7.6.0 through 7.6.2, 7.4.0 through 7.4.5, 7.2.0 through 7.2.8, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, 6.2.0 through 6.2.13, 6.0.0 through 6.0.12, FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.9, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, 6.2.0 through 6.2.13, 6.0.0 through 6.0.12 allows attacker to execute unauthorized code or commands via specifically crafted requests.

PUBLISHED Reserved 2024-10-24 | Published 2025-10-14 | Updated 2025-10-14 | Assigner fortinet




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

7.6.0
affected

7.4.0
affected

7.2.0
affected

7.0.0
affected

6.4.0
affected

Default status
unaffected

7.6.0
affected

7.4.0
affected

7.2.0
affected

7.0.0
affected

2.0.0
affected

1.2.0
affected

1.1.0
affected

1.0.0
affected

Default status
unaffected

7.6.0
affected

7.4.0
affected

7.2.0
affected

7.0.0
affected

6.4.0
affected

6.2.0
affected

6.0.0
affected

Default status
unaffected

7.6.0
affected

7.4.0
affected

7.2.0
affected

7.0.0
affected

6.4.0
affected

6.2.0
affected

6.0.0
affected

References

fortiguard.fortinet.com/psirt/FG-IR-24-442

cve.org (CVE-2024-50571)

nvd.nist.gov (CVE-2024-50571)

Download JSON