CVE-2020-12819

MEDIUM

FortiGate <6.4.1 - Buffer Overflow

Title source: llm
STIX 2.1

Description

A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context

References (1)

Core 1
Core References

Scores

CVSS v3 5.4
EPSS 0.0129
EPSS Percentile 79.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-122 CWE-787
Status published
Products (1)
fortinet/fortios < 5.6.13
Published Dec 19, 2024
Tracked Since Feb 18, 2026