Lucene search

K
vulnrichmentFortinetVULNRICHMENT:CVE-2024-26010
HistoryJun 11, 2024 - 2:32 p.m.

CVE-2024-26010

2024-06-1114:32:03
CWE-121
fortinet
github.com
9
fortinet
buffer overflow
unauthorized execution

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:W/RC:C

8.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specially crafted packets.

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiPAM",
    "versions": [
      {
        "status": "affected",
        "version": "1.2.0"
      },
      {
        "status": "affected",
        "version": "1.1.0",
        "versionType": "semver",
        "lessThanOrEqual": "1.1.2"
      },
      {
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver",
        "lessThanOrEqual": "1.0.3"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Fortinet",
    "product": "FortiSwitchManager",
    "versions": [
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.2.3"
      },
      {
        "status": "affected",
        "version": "7.0.1",
        "versionType": "semver",
        "lessThanOrEqual": "7.0.3"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Fortinet",
    "product": "FortiOS",
    "versions": [
      {
        "status": "affected",
        "version": "7.4.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.4.3"
      },
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.2.7"
      },
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.0.14"
      },
      {
        "status": "affected",
        "version": "6.4.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.4.15"
      },
      {
        "status": "affected",
        "version": "6.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.2.16"
      },
      {
        "status": "affected",
        "version": "6.0.0",
        "versionType": "semver",
        "lessThanOrEqual": "6.0.18"
      }
    ],
    "defaultStatus": "unaffected"
  },
  {
    "vendor": "Fortinet",
    "product": "FortiProxy",
    "versions": [
      {
        "status": "affected",
        "version": "7.4.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.4.2"
      },
      {
        "status": "affected",
        "version": "7.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.2.9"
      },
      {
        "status": "affected",
        "version": "7.0.0",
        "versionType": "semver",
        "lessThanOrEqual": "7.0.15"
      },
      {
        "status": "affected",
        "version": "2.0.0",
        "versionType": "semver",
        "lessThanOrEqual": "2.0.13"
      },
      {
        "status": "affected",
        "version": "1.2.0",
        "versionType": "semver",
        "lessThanOrEqual": "1.2.13"
      },
      {
        "status": "affected",
        "version": "1.1.0",
        "versionType": "semver",
        "lessThanOrEqual": "1.1.6"
      },
      {
        "status": "affected",
        "version": "1.0.0",
        "versionType": "semver",
        "lessThanOrEqual": "1.0.7"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:W/RC:C

8.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-26010