A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
Advisories

No advisories yet.

Fixes

Solution

Please upgrade to FortiWeb version 7.4.3 or above Please upgrade to FortiVoice version 7.0.2 or above Please upgrade to FortiVoice version 6.4.9 or above Please upgrade to FortiSwitchManager version 7.2.4 or above Please upgrade to FortiSwitchManager version 7.0.4 or above Please upgrade to FortiOS version 7.4.3 or above Please upgrade to FortiOS version 7.2.7 or above Please upgrade to FortiOS version 7.0.14 or above Please upgrade to FortiAuthenticator version 7.0.0 or above Please upgrade to FortiPAM version 1.2.1 or above Please upgrade to FortiPAM version 1.1.3 or above Please upgrade to FortiProxy version 7.4.3 or above Please upgrade to FortiProxy version 7.2.9 or above Please upgrade to FortiProxy version 7.0.16 or above


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.45024}

epss

{'score': 0.45616}


Thu, 10 Oct 2024 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2024-10-09'}


Wed, 09 Oct 2024 22:15:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:fortinet:fortios:*:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-10-21T23:05:24.308Z

Reserved: 2024-01-11T16:29:07.980Z

Link: CVE-2024-23113

cve-icon Vulnrichment

Updated: 2024-08-01T22:51:11.285Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-15T14:15:46.503

Modified: 2025-10-24T12:54:40.720

Link: CVE-2024-23113

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses