CVE-2023-45583

MEDIUM

Fortinet Fortiproxy < 7.0.12 - Format String Vulnerability

Title source: rule
STIX 2.1

Description

A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.

Scores

CVSS v3 6.7
EPSS 0.0021
EPSS Percentile 43.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-134
Status published
Products (6)
fortinet/fortios 7.4.0
fortinet/fortios < 7.2.6
fortinet/fortipam 1.1.0
fortinet/fortipam 1.0.0 - 1.0.3
fortinet/fortiproxy < 7.0.12
fortinet/fortiswitchmanager 7.0.0 - 7.0.3
Published May 14, 2024
Tracked Since Feb 18, 2026