QID 376856
Date Published: 2022-08-29
QID 376856: Fortinet FortiAnalyzer, FortiManager and FortiOS Buffer Overflow Vulnerability (FG-IR-21-206)
A buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability [CWE-120] in FortiAnalyzer, FortiManager, and FortiOS may allow a privileged attacker to execute arbitrary code or command via crafted CLI `execute certificate remote`, `execute vpn certificate remote` and `execute restore image` operations with the TFTP protocol.
A buffer copy without checking size of input may allow a privileged attacker to execute arbitrary code or command via crafted CLI operations with the TFTP protocol.
Supported Affected Products:
FortiOS version 6.0.0 through 6.0.14
FortiOS version 6.2.0 through 6.2.10
FortiOS version 6.4.0 through 6.4.8
FortiOS version 7.0.0 through 7.0.5
FortiManager version 5.6.0 through 5.6.11
FortiManager version 6.0.0 through 6.0.11
FortiManager version 6.2.0 through 6.2.9
FortiManager version 6.4.0 through 6.4.7
FortiManager version 7.0.0 through 7.0.2
FortiAnalyzer version 5.6.0 through 5.6.11
FortiAnalyzer version 6.0.0 through 6.0.11
FortiAnalyzer version 6.2.0 through 6.2.9
FortiAnalyzer version 6.4.0 through 6.4.7
FortiAnalyzer version 7.0.0 through 7.0.2
QID Detection Logic(Authenticated):
QID will fire the command to get system status and will match the affected versions.
It may allow a privileged attacker to execute unauthorized arbitrary code or commands via crafted CLI.
- FG-IR-21-206 -
www.fortiguard.com/psirt/FG-IR-21-206
CVEs related to QID 376856
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| FG-IR-21-206 |
|