Various imperfections in Fortinet FortiOS solved

Fortinet FortiOS flaws rectified

Pierluigi Paganini

Multiple flaws in Fortinet FortiOS fixed

Fortinet FortiOS flaws rectified

Pierluigi Paganini
June 13, 2024

Fortinet has rolled out security patches to resolve multiple vulnerabilities in FortiOS, including a significant code execution security matter.

Fortinet has addressed numerous vulnerabilities in FortiOS and other products, including some code execution issues.

The vendor has pointed out that a series of stack-based buffer overflow vulnerabilities in the FortiOS command-line interpreter [CWE-121], collectively identified as CVE-2024-23110 (CVSS score 7.4), can be leveraged by an authenticated attacker to achieve code or command execution through specifically crafted command line arguments.

As stated in the company’s advisory, “Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the FortiOS command-line interpreter may allow an authenticated attacker to execute unauthorized code or commands via specially crafted command line arguments.”

The vulnerabilities were discovered by Gwendal Guégniaud of Fortinet’s Product Security team.

The affected versions of Fortinet FortiOS are as follows:

Version Affected Solution
FortiOS 7.4 7.4.0 through 7.4.2 Upgrade to 7.4.3 or higher
FortiOS 7.2 7.2.0 through 7.2.6 Upgrade to 7.2.7 or higher
FortiOS 7.0 7.0.0 through 7.0.13 Upgrade to 7.0.14 or higher
FortiOS 6.4 6.4.0 through 6.4.14 Upgrade to 6.4.15 or higher
FortiOS 6.2 6.2.0 through 6.2.15 Upgrade to 6.2.16 or higher
FortiOS 6.0 all versions of 6.0 Migrate to a patched release

The company has also tackled the following issues of medium severity:

  • CVE-2024-26010 – A stack-based overflow vulnerability [CWE-124] in FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager could permit a remote attacker to execute arbitrary code or commands by sending crafted packets to the fgfmd daemon. However, the exploitability of this vulnerability depends on specific conditions that are not under the attacker’s control.
  • CVE-2024-23111 – A cross-site scripting vulnerability [CWE-79] in the reboot page of FortiOS and FortiProxy could enable a remote attacker with super-admin access to run JavaScript code through specially crafted HTTP GET requests.
  • CVE-2023-46720 – Multiple stack-based buffer overflow vulnerabilities [CWE-121] in FortiOS could allow an authenticated attacker to execute arbitrary code using specially crafted CLI commands.

The company has also resolved a low-severity problem identified as CVE-2024-21754.

The company has not disclosed whether any of the above issues were actively exploited in the wild.

Pierluigi Paganini

Connect with me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, Fortinet FortiOS)



About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.