QID 376856

Date Published: 2022-08-29

QID 376856: Fortinet FortiAnalyzer, FortiManager and FortiOS Buffer Overflow Vulnerability (FG-IR-21-206)

A buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability [CWE-120] in FortiAnalyzer, FortiManager, and FortiOS may allow a privileged attacker to execute arbitrary code or command via crafted CLI `execute certificate remote`, `execute vpn certificate remote` and `execute restore image` operations with the TFTP protocol.

A buffer copy without checking size of input may allow a privileged attacker to execute arbitrary code or command via crafted CLI operations with the TFTP protocol.

Supported Affected Products:
FortiOS version 6.0.0 through 6.0.14
FortiOS version 6.2.0 through 6.2.10
FortiOS version 6.4.0 through 6.4.8
FortiOS version 7.0.0 through 7.0.5

FortiManager version 5.6.0 through 5.6.11
FortiManager version 6.0.0 through 6.0.11
FortiManager version 6.2.0 through 6.2.9
FortiManager version 6.4.0 through 6.4.7
FortiManager version 7.0.0 through 7.0.2

FortiAnalyzer version 5.6.0 through 5.6.11
FortiAnalyzer version 6.0.0 through 6.0.11
FortiAnalyzer version 6.2.0 through 6.2.9
FortiAnalyzer version 6.4.0 through 6.4.7
FortiAnalyzer version 7.0.0 through 7.0.2


QID Detection Logic(Authenticated):
QID will fire the command to get system status and will match the affected versions.

It may allow a privileged attacker to execute unauthorized arbitrary code or commands via crafted CLI.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Customers are advised to refer to FG-IR-21-206 for more information.
    Vendor References

    CVEs related to QID 376856

    Software Advisories
    Advisory ID Software Component Link
    FG-IR-21-206 URL Logo www.fortiguard.com/psirt/FG-IR-21-206