Vulnerabilites related to Fortinet - FortiAP
Vulnerability from fkie_nvd
Published
2021-07-09 19:15
Modified
2024-11-21 05:55
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper neutralization of special elements used in an OS Command vulnerability in FortiAP's console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with specifically crafted arguments.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/advisory/FG-IR-20-210 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/advisory/FG-IR-20-210 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "4983FD48-A409-4A40-B936-73719B526FDC", "versionEndExcluding": "6.4.6", "versionStartIncluding": "6.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "58FFD38C-7193-4118-A0CD-B4D79773F764", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "3835833F-7C94-487C-800B-6E20DF263E79", "versionEndExcluding": "6.2.6", "versionStartIncluding": "6.2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS Command vulnerability in FortiAP\u0027s console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with specifically crafted arguments." }, { "lang": "es", "value": "Una vulnerabilidad neutralizaci\u00f3n inapropiada de los elementos especiales usados en comandos del Sistema Operativo en la consola de FortiAP versiones 6.4.1 hasta 6.4.5 y versiones 6.2.4 hasta 6.2.5, puede permitir a un atacante autenticado ejecutar comandos no autorizados al ejecutar el comando kdbg CLI con argumentos espec\u00edficamente dise\u00f1ados" } ], "id": "CVE-2021-26106", "lastModified": "2024-11-21T05:55:52.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T19:15:08.313", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/advisory/FG-IR-20-210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/advisory/FG-IR-20-210" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-13 13:15
Modified
2024-11-21 07:49
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-120 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-120 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5BE67AF-5DC9-4942-832F-03BEC88CD2B9", "versionEndExcluding": "7.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "41C213D0-356F-425E-A124-5B72A3AEE54D", "versionEndExcluding": "7.2.2", "versionStartIncluding": "7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-c:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E770699-3997-4E61-A4AD-68D102FCA4B3", "versionEndExcluding": "5.4.5", "versionStartIncluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D44BE0A-B671-454C-8B6A-56AA4BA70E60", "versionEndExcluding": "6.2.6", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "743763F2-D4DE-4E9D-B112-7CA27C61A423", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E0B46B-B76D-4D27-AD6F-E929E362B6E1", "versionEndIncluding": "7.0.1", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B602BCD9-47CF-443C-A759-0B8379777768", "versionEndExcluding": "7.0.6", "versionStartIncluding": "7.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9D26699-16AD-4752-A088-72CF117C98D0", "versionEndExcluding": "7.2.2", "versionStartIncluding": "7.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments." }, { "lang": "es", "value": "Una vulnerabilidad de filtrado incompleto de una o m\u00e1s instancias de elementos especiales [CWE-792] en el int\u00e9rprete de l\u00ednea de comando de FortiAP-W2 7.2.0 a 7.2.1, 7.0.3 a 7.0.5, 7.0.0 a 7.0.1, 6.4 todas las versiones, 6.2 todas las versiones, 6.0 todas las versiones; FortiAP-C 5.4.0 a 5.4.4, 5.2 todas las versiones; FortiAP 7.2.0 a 7.2.1, 7.0.0 a 7.0.5, 6.4 todas las versiones, 6.0 todas las versiones; FortiAP-U 7.0.0, 6.2.0 a 6.2.5, 6.0 todas las versiones, 5.4 todas las versiones puede permitir que un atacante autenticado lea archivos arbitrarios mediante argumentos de comando especialmente manipulados." } ], "id": "CVE-2023-25608", "lastModified": "2024-11-21T07:49:49.420", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T13:15:08.040", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-22-120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-22-120" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-792" } ], "source": "psirt@fortinet.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-15 23:15
Modified
2024-11-21 04:29
Severity ?
Summary
A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-19-209 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-19-209 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "B49D7931-B85F-43CF-A856-CAC551B94484", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "44FA41F6-6B1E-4296-B221-0AA4AACCBE5D", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D024C9D-DB39-408A-B015-3DCC40512C6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "79A8F245-922D-42AE-9DF1-A9292A1D97C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB24E73E-8279-44F3-9DA2-76F5B0E5D7D4", "versionEndIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8279FB-CB12-4C59-901A-D96CE162E855", "versionEndIncluding": "6.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "63F06A65-ADF7-4284-A00C-B5E862441722", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FE3508FA-E206-4377-AE36-DDD6691EA3A7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de comandos de sistema en el FortiAP-S/W2 versiones 6.2.1, 6.2.0, 6.0.5 y por debajo, FortiAP versiones 6.0.5 y por debajo y FortiAP-U versiones por debajo de 6.0.0, bajo la consola de administraci\u00f3n de la CLI puede permitir a administradores no autorizados ejecutar comandos arbitrarios a nivel de sistema por medio de comandos ifconfig especialmente dise\u00f1ados ." } ], "id": "CVE-2019-15708", "lastModified": "2024-11-21T04:29:17.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-15T23:15:11.327", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-01-14 14:15
Modified
2025-01-31 17:25
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiAP-S 6.2 all verisons, and 6.4.0 through 6.4.9, FortiAP-W2 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2, FortiAP 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2 allow a local authenticated attacker to execute unauthorized code via the CLI.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.fortinet.com/psirt/FG-IR-23-405 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortinet | fortiap | * | |
fortinet | fortiap | * | |
fortinet | fortiap-s | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2447B21-5F51-4AB1-BE8A-3B7A982F0595", "versionEndExcluding": "7.2.4", "versionStartIncluding": "6.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DF362E9-2991-4237-ABC3-4AFE64456118", "versionEndExcluding": "7.4.3", "versionStartIncluding": "7.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "C00C0CE7-F554-4AF0-AA5F-784A3B910401", "versionEndExcluding": "6.4.10", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "59C5655C-992C-40DA-8EC3-EC9D1F202B30", "versionEndExcluding": "7.2.4", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "6521DC83-31B5-4CEF-989B-2D86979140C2", "versionEndExcluding": "7.4.3", "versionStartIncluding": "7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an os command (\u0027os command injection\u0027) in Fortinet FortiAP-S 6.2 all verisons, and 6.4.0 through 6.4.9, FortiAP-W2 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2, FortiAP 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2 allow a local authenticated attacker to execute unauthorized code via the CLI." }, { "lang": "es", "value": "Una neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando del sistema operativo (\u0027inyecci\u00f3n de comando del sistema operativo\u0027) en Fortinet FortiAP-S 6.2 todas las versiones y 6.4.0 a 6.4.9, FortiAP-W2 6.4 todas las versiones, 7.0 todas las versiones, 7.2.0 a 7.2.3 y 7.4.0 a 7.4.2, FortiAP 6.4 todas las versiones, 7.0 todas las versiones, 7.2.0 a 7.2.3 y 7.4.0 a 7.4.2 permite que un atacante autenticado local ejecute c\u00f3digo no autorizado a trav\u00e9s de la CLI." } ], "id": "CVE-2024-26012", "lastModified": "2025-01-31T17:25:06.157", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-01-14T14:15:28.893", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-405" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@fortinet.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-06 18:15
Modified
2024-11-21 06:58
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-21-163 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-21-163 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortinet | fortiap | * | |
fortinet | fortiap | * | |
fortinet | fortiap | * | |
fortinet | fortiap | 7.2.0 | |
fortinet | fortiap-s | * | |
fortinet | fortiap-s | * | |
fortinet | fortiap-s | * | |
fortinet | fortiap-u | * | |
fortinet | fortiap-u | * | |
fortinet | fortiap-u | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | * | |
fortinet | fortiap-w2 | 7.2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C2EBA1B-2FFE-4B09-AF81-570161EB6BF3", "versionEndIncluding": "6.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEF13641-3F15-4345-B777-932C827B6EBD", "versionEndExcluding": "6.4.8", "versionStartIncluding": "6.4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:*:*:*:*:*:*:*:*", "matchCriteriaId": "63A8CD15-B81E-4E36-943D-FE2D822C30D5", "versionEndExcluding": "7.0.4", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD3A3A70-3B13-40A4-893C-7397BB28F952", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "F80D4C66-4D1B-4759-844F-9BB508E576EB", "versionEndIncluding": "6.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "95385DA4-11F6-487E-8D46-9DB888EE85CF", "versionEndIncluding": "6.2.6", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-s:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDFD96E1-C7EF-4AF1-8E3F-1BB8EA48A401", "versionEndExcluding": "6.4.8", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BEF86D0-7255-4054-8AA7-4AA411C5FE32", "versionEndIncluding": "5.4.6", "versionStartIncluding": "5.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "607B4B16-A019-4DB5-A3D5-845B3C81E2CA", "versionEndIncluding": "6.0.4", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-u:*:*:*:*:*:*:*:*", "matchCriteriaId": "F681257D-8CBE-4B23-9B38-7491876EB68C", "versionEndExcluding": "6.2.4", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "F71CA9D4-236C-4D96-BBA5-24A880BB347D", "versionEndIncluding": "6.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "96495773-F770-4F9C-B760-CD03CE1FDC6C", "versionEndIncluding": "6.2.6", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BA6B411-9438-487B-891E-079C8FB7ECD0", "versionEndExcluding": "6.4.8", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:*:*:*:*:*:*:*:*", "matchCriteriaId": "76F6BD2D-AC3B-4863-A536-D30D87307132", "versionEndExcluding": "7.0.4", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiap-w2:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "21B77DBC-6B9F-4EF0-847C-D2BDE123DDE4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands." }, { "lang": "es", "value": "Una neutralizaci\u00f3n inapropiada de elementos especiales [CWE-89] usados en una vulnerabilidad de comandos del Sistema Operativo [CWE-78] en el int\u00e9rprete de l\u00ednea de comandos de FortiAP versiones 6.0.0 hasta 6.4.7, 7.0.0 hasta 7.0.3, 7.2.0, FortiAP-S versiones 6.0.0 hasta 6.4. 7, FortiAP-W2 versiones 6.0.0 hasta 6.4.7, 7.0.0 hasta 7.0.3, 7.2.0 y FortiAP-U versiones 5.4.0 hasta 6.2.3, pueden permitir a un atacante autenticado ejecutar comandos no autorizados por medio de argumentos espec\u00edficamente dise\u00f1ados para comandos existentes.\n" } ], "id": "CVE-2022-29058", "lastModified": "2024-11-21T06:58:25.527", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-06T18:15:13.053", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2023-25608 (GCVE-0-2023-25608)
Vulnerability from cvelistv5
Published
2023-09-13 12:28
Modified
2024-09-24 20:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-792 - Information disclosure
Summary
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Fortinet | FortiAP-W2 |
Version: 7.2.0 ≤ 7.2.1 Version: 7.0.3 ≤ 7.0.5 Version: 7.0.0 ≤ 7.0.1 Version: 6.4.0 ≤ 6.4.9 Version: 6.2.0 ≤ 6.2.6 Version: 6.0.0 ≤ 6.0.6 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:19.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-22-120", "tags": [ "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-22-120" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25608", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T19:45:36.151614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T20:00:10.726Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FortiAP-W2", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.2.1", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.0.5", "status": "affected", "version": "7.0.3", "versionType": "semver" }, { "lessThanOrEqual": "7.0.1", "status": "affected", "version": "7.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.6", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.6", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP-C", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "5.4.4", "status": "affected", "version": "5.4.0", "versionType": "semver" }, { "lessThanOrEqual": "5.2.1", "status": "affected", "version": "5.2.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.2.1", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.0.5", "status": "affected", "version": "7.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.3", "versionType": "semver" }, { "lessThanOrEqual": "6.0.6", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "7.0.0" }, { "lessThanOrEqual": "6.2.5", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.4", "status": "affected", "version": "6.0.0", "versionType": "semver" }, { "lessThanOrEqual": "5.4.6", "status": "affected", "version": "5.4.3", "versionType": "semver" }, { "status": "affected", "version": "5.4.0" } ] }, { "defaultStatus": "unaffected", "product": "FortiAP-S", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.6", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.6", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-792", "description": "Information disclosure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T12:28:51.497Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-22-120", "url": "https://fortiguard.com/psirt/FG-IR-22-120" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiAP-W2 version 7.2.2 or above Please upgrade to FortiAP-W2 version 7.0.6 or above Please upgrade to FortiAP-C version 5.4.5 or above Please upgrade to FortiAP version 7.2.2 or above Please upgrade to FortiAP version 7.0.6 or above Please upgrade to FortiAP-U version 7.0.1 or above Please upgrade to FortiAP-U version 6.2.6 or above " } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2023-25608", "datePublished": "2023-09-13T12:28:51.497Z", "dateReserved": "2023-02-08T13:42:03.367Z", "dateUpdated": "2024-09-24T20:00:10.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26106 (GCVE-0-2021-26106)
Vulnerability from cvelistv5
Published
2021-07-09 18:26
Modified
2024-10-25 13:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Execute unauthorized code or commands
Summary
An improper neutralization of special elements used in an OS Command vulnerability in FortiAP's console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with specifically crafted arguments.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiAP-W2, FortiAP-S, FortiAP |
Version: FortiAP-W2 6.2.4 through 6.2.5; FortiAP-S 6.2.4 through 6.2.5; FortiAP 6.4.1 through 6.4.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:19.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/advisory/FG-IR-20-210" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-26106", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T14:13:42.961833Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T13:56:41.494Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiAP-W2, FortiAP-S, FortiAP", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "FortiAP-W2 6.2.4 through 6.2.5; FortiAP-S 6.2.4 through 6.2.5; FortiAP 6.4.1 through 6.4.5" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS Command vulnerability in FortiAP\u0027s console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with specifically crafted arguments." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-09T18:26:30", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/advisory/FG-IR-20-210" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2021-26106", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiAP-W2, FortiAP-S, FortiAP", "version": { "version_data": [ { "version_value": "FortiAP-W2 6.2.4 through 6.2.5; FortiAP-S 6.2.4 through 6.2.5; FortiAP 6.4.1 through 6.4.5" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper neutralization of special elements used in an OS Command vulnerability in FortiAP\u0027s console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with specifically crafted arguments." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.6, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/advisory/FG-IR-20-210", "refsource": "CONFIRM", "url": "https://fortiguard.com/advisory/FG-IR-20-210" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2021-26106", "datePublished": "2021-07-09T18:26:30", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-10-25T13:56:41.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-29058 (GCVE-0-2022-29058)
Vulnerability from cvelistv5
Published
2022-09-06 15:10
Modified
2024-10-25 13:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Execute unauthorized code or commands
Summary
An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Fortinet | Fortinet FortiAP, FortiAP-S, FortiAP-W2, FortiAP-U |
Version: FortiAP-U 5.4.0 through 6.2.3; FortiAP-S 6.0.0 through 6.4.7; FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0; FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0. |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:10:59.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-29058", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T14:12:24.249054Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T13:30:21.436Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiAP, FortiAP-S, FortiAP-W2, FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "FortiAP-U 5.4.0 through 6.2.3; FortiAP-S 6.0.0 through 6.4.7; FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0; FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0." } ] } ], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "FUNCTIONAL", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "remediationLevel": "UNAVAILABLE", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 7.6, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-06T15:10:15", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2022-29058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiAP, FortiAP-S, FortiAP-W2, FortiAP-U", "version": { "version_data": [ { "version_value": "FortiAP-U 5.4.0 through 6.2.3; FortiAP-S 6.0.0 through 6.4.7; FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0; FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0." } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper neutralization of special elements [CWE-89] used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiAP 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0, FortiAP-S 6.0.0 through 6.4.7, FortiAP-W2 6.0.0 through 6.4.7, 7.0.0 through 7.0.3, 7.2.0 and FortiAP-U 5.4.0 through 6.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands." } ] }, "impact": { "cvss": { "attackComplexity": "Low", "attackVector": "Local", "availabilityImpact": "High", "baseScore": 7.6, "baseSeverity": "High", "confidentialityImpact": "High", "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "userInteraction": "None", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-21-163", "refsource": "CONFIRM", "url": "https://fortiguard.com/psirt/FG-IR-21-163" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2022-29058", "datePublished": "2022-09-06T15:10:15", "dateReserved": "2022-04-11T00:00:00", "dateUpdated": "2024-10-25T13:30:21.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-15708 (GCVE-0-2019-15708)
Vulnerability from cvelistv5
Published
2020-03-15 22:27
Modified
2024-10-25 14:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Execute unauthorized code or commands
Summary
A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Fortinet | Fortinet FortiAP-S/W2 |
Version: 6.2.1 Version: 6.2.0 Version: 6.0.5 and below |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T00:56:22.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-15708", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-24T20:03:38.903696Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T14:25:55.858Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Fortinet FortiAP-S/W2", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "6.2.0" }, { "status": "affected", "version": "6.0.5 and below" } ] }, { "product": "Fortinet FortiAP-U", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "6.0.5 and below" } ] }, { "product": "Fortinet FortiAP", "vendor": "Fortinet", "versions": [ { "status": "affected", "version": "below 6.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Execute unauthorized code or commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-15T22:27:49", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@fortinet.com", "ID": "CVE-2019-15708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Fortinet FortiAP-S/W2", "version": { "version_data": [ { "version_value": "6.2.1" }, { "version_value": "6.2.0" }, { "version_value": "6.0.5 and below" } ] } }, { "product_name": "Fortinet FortiAP-U", "version": { "version_data": [ { "version_value": "6.0.5 and below" } ] } }, { "product_name": "Fortinet FortiAP", "version": { "version_data": [ { "version_value": "below 6.0.0" } ] } } ] }, "vendor_name": "Fortinet" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A system command injection vulnerability in the FortiAP-S/W2 6.2.1, 6.2.0, 6.0.5 and below, FortiAP 6.0.5 and below and FortiAP-U below 6.0.0 under CLI admin console may allow unauthorized administrators to run arbitrary system level commands via specially crafted ifconfig commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Execute unauthorized code or commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://fortiguard.com/psirt/FG-IR-19-209", "refsource": "CONFIRM", "url": "https://fortiguard.com/psirt/FG-IR-19-209" } ] } } } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2019-15708", "datePublished": "2020-03-15T22:27:49", "dateReserved": "2019-08-27T00:00:00", "dateUpdated": "2024-10-25T14:25:55.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-26012 (GCVE-0-2024-26012)
Vulnerability from cvelistv5
Published
2025-01-14 14:09
Modified
2025-01-15 14:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Execute unauthorized code or commands
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiAP-S 6.2 all verisons, and 6.4.0 through 6.4.9, FortiAP-W2 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2, FortiAP 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2 allow a local authenticated attacker to execute unauthorized code via the CLI.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Fortinet | FortiAP-S |
Version: 6.4.0 ≤ 6.4.9 Version: 6.2.0 ≤ 6.2.6 cpe:2.3:a:fortinet:fortiap-s:6.4.9:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.8:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiap-s:6.2.0:*:*:*:*:*:*:* |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-26012", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-15T14:56:09.448550Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-15T14:56:20.011Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:fortinet:fortiap-s:6.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap-s:6.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "FortiAP-S", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.6", "status": "affected", "version": "6.2.0", "versionType": "semver" } ] }, { "cpes": [], "defaultStatus": "unaffected", "product": "FortiAP-W2", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.4.2", "status": "affected", "version": "7.4.0", "versionType": "semver" }, { "lessThanOrEqual": "7.2.3", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.0.8", "status": "affected", "version": "7.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.4.10", "status": "affected", "version": "6.4.0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:fortinet:fortiap:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:6.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:6.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:6.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:6.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:6.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:6.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiap:6.4.3:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "FortiAP", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.4.2", "status": "affected", "version": "7.4.0", "versionType": "semver" }, { "lessThanOrEqual": "7.2.3", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.0.7", "status": "affected", "version": "7.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.4.9", "status": "affected", "version": "6.4.3", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A improper neutralization of special elements used in an os command (\u0027os command injection\u0027) in Fortinet FortiAP-S 6.2 all verisons, and 6.4.0 through 6.4.9, FortiAP-W2 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2, FortiAP 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.3, and 7.4.0 through 7.4.2 allow a local authenticated attacker to execute unauthorized code via the CLI." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Execute unauthorized code or commands", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-14T14:09:54.124Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.fortinet.com/psirt/FG-IR-23-405", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-405" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiAP-S version 6.4.10 or above \nPlease upgrade to FortiAP-W2 version 7.4.3 or above \nPlease upgrade to FortiAP-W2 version 7.2.4 or above \nPlease upgrade to FortiAP version 7.4.3 or above \nPlease upgrade to FortiAP version 7.2.4 or above" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2024-26012", "datePublished": "2025-01-14T14:09:54.124Z", "dateReserved": "2024-02-14T09:18:43.246Z", "dateUpdated": "2025-01-15T14:56:20.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }