fkie_cve-2023-29177
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 07:56
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple buffer copy without checking size of input ('classic buffer overflow') vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-23-064 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-23-064 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fortinet | fortiadc | * | |
fortinet | fortiadc | 5.2.0 | |
fortinet | fortiadc | 5.3.0 | |
fortinet | fortiadc | 5.4.0 | |
fortinet | fortiadc | 6.0.0 | |
fortinet | fortiadc | 6.1.0 | |
fortinet | fortiadc | 6.2.0 | |
fortinet | fortiadc | 7.0.0 | |
fortinet | fortiadc | 7.2.0 | |
fortinet | fortiddos-f | * | |
fortinet | fortiddos-f | * | |
fortinet | fortiddos-f | 6.2.0 | |
fortinet | fortiddos-f | 6.3.0 | |
fortinet | fortiddos-f | 6.5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EE864BE-0405-485C-997E-072092F6BB5E", "versionEndIncluding": "7.1.2", "versionStartIncluding": "7.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:5.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "20EC4BBC-C056-4B63-8D08-F1F6F77CED5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:5.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "F67FE569-A1C6-4592-B650-444C94C45A90", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:5.4.0:-:*:*:*:*:*:*", "matchCriteriaId": "A3B866E2-9E6A-4F82-ABBC-800F87152FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:6.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "C61C6239-ACC1-4A3B-ABC4-B2C501148927", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:6.1.0:-:*:*:*:*:*:*", "matchCriteriaId": "43DED0DD-E584-4ECF-8B0F-2FB8B3167889", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:6.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "63B95B99-89C8-4797-8FDA-2887596ADFED", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:7.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "70AE3711-D7D8-49A3-981D-CD96F2497CB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "74B0A112-AA30-4D11-8F36-3DC8A2EBCA16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7B816ED-6776-46CF-9F8C-B0A2CF3716F1", "versionEndIncluding": "6.1.4", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*", "matchCriteriaId": "847C6FC1-DBCF-4803-BDDB-6E2C5B079ECD", "versionEndIncluding": "6.4.1", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiddos-f:6.2.0:-:*:*:*:*:*:*", "matchCriteriaId": "4DD47EAD-BE0A-4E66-BAE6-BFECD8FBCC1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiddos-f:6.3.0:-:*:*:*:*:*:*", "matchCriteriaId": "A702B46E-1BA1-4D57-BBC5-96B66DB83FAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:fortinet:fortiddos-f:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0DB1731B-7799-408B-8F8C-F5ABFEA7A180", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer copy without checking size of input (\u0027classic buffer overflow\u0027) vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 \u0026 FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests." }, { "lang": "es", "value": "Las vulnerabilidades de copia de b\u00fafer m\u00faltiple sin verificar el tama\u00f1o de entrada (\u0027desbordamiento del b\u00fafer cl\u00e1sico\u0027) [CWE-120] en FortiADC versi\u00f3n 7.2.0 y anteriores a 7.1.2 y FortiDDoS-F versi\u00f3n 6.5.0 y anteriores a 6.4.1 permiten a un atacante privilegiado ejecutar c\u00f3digo o comandos arbitrarios a trav\u00e9s de solicitudes CLI espec\u00edficamente manipuladas." } ], "id": "CVE-2023-29177", "lastModified": "2024-11-21T07:56:39.793", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:24.337", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Third Party Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-23-064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-23-064" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "psirt@fortinet.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…