{"id":164494,"date":"2024-06-13T08:31:32","date_gmt":"2024-06-13T08:31:32","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=164494"},"modified":"2024-06-13T08:31:34","modified_gmt":"2024-06-13T08:31:34","slug":"fortios-high-severity-code-execution-flaws","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/164494\/security\/fortios-high-severity-code-execution-flaws.html","title":{"rendered":"Multiple flaws in Fortinet FortiOS fixed"},"content":{"rendered":"
<\/div>\n

Fortinet released security updates to address multiple vulnerabilities in FortiOS, including a high-severity code execution security issue.<\/h2>\n\n\n\n

Fortinet addressed multiple vulnerabilities in FortiOS and other products, including some code execution flaws.<\/p>\n\n\n\n

The company states that multiple stack-based buffer overflow vulnerabilities in the command line interpreter of FortiOS [CWE-121], collectively tracked as CVE-2024-23110 (CVSS score of 7.4), can be exploited by an authenticated attacker to achieve code or command execution via specially crafted command line arguments<\/p>\n\n\n\n

“Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the command line interpreter of FortiOS may allow an authenticated attacker to execute unauthorized code or commands via specially crafted command line arguments” reads the advisory<\/strong><\/a> published by the company.<\/gwmw><\/p>\n\n\n\n

Gwendal Gu\u00e9gniaud of Fortinet Product Security team discovered the vulnerabilities.<\/p>\n\n\n\n

The flaws impact the following versions of the Fortinet FortiOS :<\/gwmw><\/p>\n\n\n\n

Version<\/th>Affected<\/th>Solution<\/th><\/tr><\/thead>
FortiOS 7.4<\/gwmw><\/td>7.4.0 through 7.4.2<\/td>Upgrade to 7.4.3 or above<\/td><\/tr>
FortiOS 7.2<\/td>7.2.0 through 7.2.6<\/td>Upgrade to 7.2.7 or above<\/td><\/tr>
FortiOS 7.0<\/td>7.0.0 through 7.0.13<\/td>Upgrade to 7.0.14 or above<\/td><\/tr>
FortiOS 6.4<\/td>6.4.0 through 6.4.14<\/td>Upgrade to 6.4.15 or above<\/td><\/tr>
FortiOS 6.2<\/td>6.2.0 through 6.2.15<\/td>Upgrade to 6.2.16 or above<\/td><\/tr>
FortiOS 6.0<\/td>6.0 all versions<\/td>Migrate to a fixed release<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n

<\/gwmw>The company also addressed the following medium-severity issues:<\/gwmw><\/p>\n\n\n\n