Description
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiAnalyzer version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiManager version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiOS version 7.0.0 through 7.0.4, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x and FortiProxy version 7.0.0 through 7.0.3, 2.0.0 through 2.0.8, 1.2.x, 1.1.x and 1.0.x allows attacker to execute unauthorized code or commands via crafted CLI `execute restore image` and `execute certificate remote` operations with the tFTP protocol.
References (2)
Core 2
Core References
Not Applicable
https://fortiguard.com/advisory/FG-IR-21-206
Vendor Advisory
https://www.fortiguard.com/psirt/FG-IR-21-206
Scores
CVSS v3
6.7
EPSS
0.0006
EPSS Percentile
18.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (4)
fortinet/fortianalyzer
5.6.0 - 6.4.8
fortinet/fortimanager
5.6.0 - 6.4.8
fortinet/fortios
6.0.0 - 6.2.11
fortinet/fortiproxy
1.0.0 - 2.0.9
Published
Jul 18, 2023
Tracked Since
Feb 18, 2026