Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-23110
Vulnerability from cvelistv5
Published
2024-06-11 14:31
Modified
2024-08-01 22:51
Severity ?
EPSS score ?
Summary
A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands
References
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-23-460 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-23-460 | Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "fortios", "vendor": "fortinet", "versions": [ { "lessThanOrEqual": "7.4.2", "status": "affected", "version": "7.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "fortios", "vendor": "fortinet", "versions": [ { "lessThanOrEqual": "7.2.6", "status": "affected", "version": "7.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "fortios", "vendor": "fortinet", "versions": [ { "lessThanOrEqual": "7.0.13", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "fortios", "vendor": "fortinet", "versions": [ { "lessThanOrEqual": "6.4.14", "status": "affected", "version": "6.4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:fortinet:fortios:6.2.9:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "fortios", "vendor": "fortinet", "versions": [ { "lessThanOrEqual": "6.2.15", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:fortinet:fortios:6.0.13:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "fortios", "vendor": "fortinet", "versions": [ { "lessThanOrEqual": "6.0.18", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23110", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-13T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T03:55:22.225Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:51:11.248Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-23-460", "tags": [ "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-23-460" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FortiOS", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.4.2", "status": "affected", "version": "7.4.0", "versionType": "semver" }, { "lessThanOrEqual": "7.2.6", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.0.13", "status": "affected", "version": "7.0.0", "versionType": "semver" }, { "lessThanOrEqual": "6.4.14", "status": "affected", "version": "6.4.0", "versionType": "semver" }, { "lessThanOrEqual": "6.2.15", "status": "affected", "version": "6.2.0", "versionType": "semver" }, { "lessThanOrEqual": "6.0.18", "status": "affected", "version": "6.0.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Execute unauthorized code or commands", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-11T14:31:59.230Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-23-460", "url": "https://fortiguard.com/psirt/FG-IR-23-460" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiOS version 7.4.3 or above \nPlease upgrade to FortiOS version 7.2.7 or above \nPlease upgrade to FortiOS version 7.0.14 or above \nPlease upgrade to FortiOS version 6.4.15 or above \nPlease upgrade to FortiOS version 6.2.16 or above \n" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2024-23110", "datePublished": "2024-06-11T14:31:59.230Z", "dateReserved": "2024-01-11T16:29:07.979Z", "dateUpdated": "2024-08-01T22:51:11.248Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-23110\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2024-06-11T15:16:03.707\",\"lastModified\":\"2024-11-21T08:56:57.093\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer basado en pila en Fortinet FortiOS versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.6, 7.0.0 a 7.0.13, 6.4.0 a 6.4.14, 6.2.0 a 6.2.15, 6.0 todas las versiones permiten al atacante ejecutar c\u00f3digo o comandos no autorizados mediante comandos especialmente manipulados\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndExcluding\":\"6.2.16\",\"matchCriteriaId\":\"E9BCDC86-176E-401A-B188-F77E22BCFC2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0\",\"versionEndExcluding\":\"6.4.15\",\"matchCriteriaId\":\"4E29353F-8791-4117-BA7A-E32FAB8348A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.14\",\"matchCriteriaId\":\"C119229A-3805-47C1-B3F9-AF1A4007A63B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndExcluding\":\"7.2.7\",\"matchCriteriaId\":\"553C4BA9-953B-4017-8498-785BDA7A3006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.4.0\",\"versionEndExcluding\":\"7.4.3\",\"matchCriteriaId\":\"757A5257-6103-4DC5-B79F-727E4279614A\"}]}]}],\"references\":[{\"url\":\"https://fortiguard.com/psirt/FG-IR-23-460\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://fortiguard.com/psirt/FG-IR-23-460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://fortiguard.com/psirt/FG-IR-23-460\", \"name\": \"https://fortiguard.com/psirt/FG-IR-23-460\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:51:11.248Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-23110\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-11T16:24:38.714359Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*\"], \"vendor\": \"fortinet\", \"product\": \"fortios\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.4.2\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*\"], \"vendor\": \"fortinet\", \"product\": \"fortios\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.2.6\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:fortinet:fortios:7.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"fortinet\", \"product\": \"fortios\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.0.13\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*\"], \"vendor\": \"fortinet\", \"product\": \"fortios\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.4.14\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:fortinet:fortios:6.2.9:*:*:*:*:*:*:*\"], \"vendor\": \"fortinet\", \"product\": \"fortios\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.2.15\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:fortinet:fortios:6.0.13:*:*:*:*:*:*:*\"], \"vendor\": \"fortinet\", \"product\": \"fortios\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.0.18\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-11T16:25:13.579Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Fortinet\", \"product\": \"FortiOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4.2\"}, {\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2.6\"}, {\"status\": \"affected\", \"version\": \"7.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.0.13\"}, {\"status\": \"affected\", \"version\": \"6.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.4.14\"}, {\"status\": \"affected\", \"version\": \"6.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.2.15\"}, {\"status\": \"affected\", \"version\": \"6.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.0.18\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Please upgrade to FortiOS version 7.4.3 or above \\nPlease upgrade to FortiOS version 7.2.7 or above \\nPlease upgrade to FortiOS version 7.0.14 or above \\nPlease upgrade to FortiOS version 6.4.15 or above \\nPlease upgrade to FortiOS version 6.2.16 or above \\n\"}], \"references\": [{\"url\": \"https://fortiguard.com/psirt/FG-IR-23-460\", \"name\": \"https://fortiguard.com/psirt/FG-IR-23-460\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"Execute unauthorized code or commands\"}]}], \"providerMetadata\": {\"orgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"shortName\": \"fortinet\", \"dateUpdated\": \"2024-06-11T14:31:59.230Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-23110\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T22:51:11.248Z\", \"dateReserved\": \"2024-01-11T16:29:07.979Z\", \"assignerOrgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"datePublished\": \"2024-06-11T14:31:59.230Z\", \"assignerShortName\": \"fortinet\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ncsc-2024-0261
Vulnerability from csaf_ncscnl
Published
2024-06-14 09:59
Modified
2024-06-14 09:59
Summary
Kwetsbaarheid verholpen in Fortinet FortiOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Fortinet heeft kwetsbaarheden verholpen in FortiOS.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om middels een Cross-Site-Scripting aanval, of middels SQL-Injection, willekeurige code uit te voeren op het kwetsbare systeem. Ook kan een kwaadwillende beveiligingsmaatregelen omzeilen en zo verkeer door laten gaan, welke aanvankelijk niet is toegestaan.
Oplossingen
Fortinet heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-121
Stack-based Buffer Overflow
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-916
Use of Password Hash With Insufficient Computational Effort
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Fortinet heeft kwetsbaarheden verholpen in FortiOS.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om middels een Cross-Site-Scripting aanval, of middels SQL-Injection, willekeurige code uit te voeren op het kwetsbare systeem. Ook kan een kwaadwillende beveiligingsmaatregelen omzeilen en zo verkeer door laten gaan, welke aanvankelijk niet is toegestaan.", "title": "Interpretaties" }, { "category": "description", "text": "Fortinet heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" }, { "category": "general", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-356" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-423" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-460" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-471" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-036" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-128" } ], "title": "Kwetsbaarheid verholpen in Fortinet FortiOS", "tracking": { "current_release_date": "2024-06-14T09:59:56.652183Z", "id": "NCSC-2024-0261", "initial_release_date": "2024-06-14T09:59:56.652183Z", "revision_history": [ { "date": "2024-06-14T09:59:56.652183Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548852", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548851", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548850", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548848", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548847", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548846", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548845", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548844", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548843", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548973", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935966", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548842", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548841", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548840", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548839", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548838", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548836", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548835", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548834", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548688", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548687", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548678", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548677", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548676", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548675", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548674", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548726", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-956797", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548686", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548685", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548684", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548683", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548682", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548681", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548680", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548679", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548673", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548672", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548663", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548662", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548661", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548724", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548723", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935976", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548671", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548670", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548669", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548668", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548667", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548666", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548665", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548664", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548660", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548659", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548649", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548648", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548766", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-691363", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935975", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935974", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548658", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548657", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548656", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548655", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548654", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548653", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548651", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548650", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548647", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548646", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548645", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548644", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548643", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-592974", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-691362", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935973", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1476464", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-592973", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-691361", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-936011", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1476463", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555357", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555356", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555355", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555354", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936015", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936014", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936013", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936012", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-1476787", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-80581", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-80582", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-80580", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910573", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910572", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910571", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910570", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-1476788", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-1476789", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-749726", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-265532", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73422", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73411", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73407", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73399", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73424", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73458", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73448", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73438", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73447", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73435", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73395", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73419", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73413", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73408", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73434", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73432", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73390", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73440", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73437", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73394", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73421", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73459", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73446", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73404", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73430", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73420", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73428", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73402", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73444", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73392", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73457", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73397", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-318258", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73456", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-548970", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-935967", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73451", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73405", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73431", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73387", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73415", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73400", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73443", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73454", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73460", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73453", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-548638", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691404", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691403", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691402", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-838762", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-905594", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-936010", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-936009", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73439", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73409", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73418", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73425", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73398", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73441", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73449", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-171977", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73410", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73417", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-1476462", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73388", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-446088", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-548637", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691401", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691400", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691399", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-838761", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-1445940", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-816913", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-816914", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-838760", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-1445939", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-219732", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-956804", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-856891", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-219733", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-219730", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-493435", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-856890", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168504", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265689", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47866", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54589", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54556", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54523", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54534", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73429", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73396", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73442", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377288", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1476846", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47883", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47888", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47871", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47892", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47859", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47880", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47864", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54593", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47891", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47868", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73386", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73433", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73401", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73445", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377284", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-798802", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-958877", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54595", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54607", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54526", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54497", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54631", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54591", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54640", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54647", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54605", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54608", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73455", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73423", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377282", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377286", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-816089", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1445938", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54537", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54508", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54563", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54562", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54569", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54536", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73406", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73412", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168706", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54514", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168713", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168714", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168715", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-707019", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54518", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73416", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73389", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73427", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73403", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73450", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73452", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73393", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73414", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73426", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73391", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73436", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168716", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265688", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265687", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265686", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-599108", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-707018", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-832162", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-749703", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-1476815", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "fortinet" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23110", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-548723", "CSAFPID-548688", "CSAFPID-548726", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23110", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23110.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-548723", "CSAFPID-548688", "CSAFPID-548726", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534" ] } ], "title": "CVE-2024-23110" }, { "cve": "CVE-2023-46720", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-592973", "CSAFPID-691361", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-548766", "CSAFPID-548667", "CSAFPID-935976", "CSAFPID-548679", "CSAFPID-956797", "CSAFPID-548846", "CSAFPID-935966", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46720", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46720.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X", "version": "3.1" }, "products": [ "CSAFPID-592973", "CSAFPID-691361", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-548766", "CSAFPID-548667", "CSAFPID-935976", "CSAFPID-548679", "CSAFPID-956797", "CSAFPID-548846", "CSAFPID-935966", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845" ] } ], "title": "CVE-2023-46720" }, { "cve": "CVE-2024-21754", "cwe": { "id": "CWE-916", "name": "Use of Password Hash With Insufficient Computational Effort" }, "notes": [ { "category": "other", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" } ], "product_status": { "known_affected": [ "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1476462", "CSAFPID-73460", "CSAFPID-936009", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-1476464", "CSAFPID-548660", "CSAFPID-935974", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-935973", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-935975", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-1445940", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-936010", "CSAFPID-905594", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21754", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21754.json" } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N/E:F/RL:X/RC:R", "version": "3.1" }, "products": [ "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1476462", "CSAFPID-73460", "CSAFPID-936009", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-1476464", "CSAFPID-548660", "CSAFPID-935974", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-935973", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-935975", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-1445940", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-936010", "CSAFPID-905594", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] } ], "title": "CVE-2024-21754" }, { "cve": "CVE-2024-31495", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" } ], "product_status": { "known_affected": [ "CSAFPID-749726", "CSAFPID-80581", "CSAFPID-910570", "CSAFPID-80580", "CSAFPID-910571", "CSAFPID-80582", "CSAFPID-910572", "CSAFPID-910573" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31495", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31495.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-749726", "CSAFPID-80581", "CSAFPID-910570", "CSAFPID-80580", "CSAFPID-910571", "CSAFPID-80582", "CSAFPID-910572", "CSAFPID-910573" ] } ], "title": "CVE-2024-31495" }, { "cve": "CVE-2024-26010", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-936012", "CSAFPID-936015", "CSAFPID-936013", "CSAFPID-555357", "CSAFPID-555354", "CSAFPID-219733", "CSAFPID-856890", "CSAFPID-219732", "CSAFPID-856891", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-935975", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-548688", "CSAFPID-956797", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1445940", "CSAFPID-73460", "CSAFPID-905594", "CSAFPID-73392", "CSAFPID-548970", "CSAFPID-73432", "CSAFPID-73421", "CSAFPID-73447", "CSAFPID-73434", "CSAFPID-73422", "CSAFPID-73438", "CSAFPID-749703", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-936014", "CSAFPID-555355", "CSAFPID-555356", "CSAFPID-816914", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457", "CSAFPID-73394", "CSAFPID-73437", "CSAFPID-73440", "CSAFPID-73444", "CSAFPID-73402", "CSAFPID-73428", "CSAFPID-73420", "CSAFPID-73430", "CSAFPID-73404", "CSAFPID-73446", "CSAFPID-73459", "CSAFPID-73390", "CSAFPID-73408", "CSAFPID-73413", "CSAFPID-73419", "CSAFPID-73395", "CSAFPID-73435", "CSAFPID-73448", "CSAFPID-73458", "CSAFPID-73424", "CSAFPID-73399", "CSAFPID-73407", "CSAFPID-73411", "CSAFPID-493435", "CSAFPID-219730", "CSAFPID-956804", "CSAFPID-1445939", "CSAFPID-936010", "CSAFPID-935967" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26010.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:W/RC:C", "version": "3.1" }, "products": [ "CSAFPID-936012", "CSAFPID-936015", "CSAFPID-936013", "CSAFPID-555357", "CSAFPID-555354", "CSAFPID-219733", "CSAFPID-856890", "CSAFPID-219732", "CSAFPID-856891", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-935975", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-548688", "CSAFPID-956797", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1445940", "CSAFPID-73460", "CSAFPID-905594", "CSAFPID-73392", "CSAFPID-548970", "CSAFPID-73432", "CSAFPID-73421", "CSAFPID-73447", "CSAFPID-73434", "CSAFPID-73422", "CSAFPID-73438", "CSAFPID-749703", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-936014", "CSAFPID-555355", "CSAFPID-555356", "CSAFPID-816914", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457", "CSAFPID-73394", "CSAFPID-73437", "CSAFPID-73440", "CSAFPID-73444", "CSAFPID-73402", "CSAFPID-73428", "CSAFPID-73420", "CSAFPID-73430", "CSAFPID-73404", "CSAFPID-73446", "CSAFPID-73459", "CSAFPID-73390", "CSAFPID-73408", "CSAFPID-73413", "CSAFPID-73419", "CSAFPID-73395", "CSAFPID-73435", "CSAFPID-73448", "CSAFPID-73458", "CSAFPID-73424", "CSAFPID-73399", "CSAFPID-73407", "CSAFPID-73411", "CSAFPID-493435", "CSAFPID-219730", "CSAFPID-956804", "CSAFPID-1445939", "CSAFPID-936010", "CSAFPID-935967" ] } ], "title": "CVE-2024-26010" }, { "cve": "CVE-2024-23111", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-838761", "CSAFPID-73460", "CSAFPID-838762", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23111", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23111.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.1" }, "products": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-838761", "CSAFPID-73460", "CSAFPID-838762", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] } ], "title": "CVE-2024-23111" } ] }
NCSC-2024-0261
Vulnerability from csaf_ncscnl
Published
2024-06-14 09:59
Modified
2024-06-14 09:59
Summary
Kwetsbaarheid verholpen in Fortinet FortiOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Fortinet heeft kwetsbaarheden verholpen in FortiOS.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om middels een Cross-Site-Scripting aanval, of middels SQL-Injection, willekeurige code uit te voeren op het kwetsbare systeem. Ook kan een kwaadwillende beveiligingsmaatregelen omzeilen en zo verkeer door laten gaan, welke aanvankelijk niet is toegestaan.
Oplossingen
Fortinet heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-121
Stack-based Buffer Overflow
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE-916
Use of Password Hash With Insufficient Computational Effort
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Fortinet heeft kwetsbaarheden verholpen in FortiOS.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om middels een Cross-Site-Scripting aanval, of middels SQL-Injection, willekeurige code uit te voeren op het kwetsbare systeem. Ook kan een kwaadwillende beveiligingsmaatregelen omzeilen en zo verkeer door laten gaan, welke aanvankelijk niet is toegestaan.", "title": "Interpretaties" }, { "category": "description", "text": "Fortinet heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" }, { "category": "general", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-356" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-423" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-460" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-471" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-036" }, { "category": "external", "summary": "Source - fortinet", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-128" } ], "title": "Kwetsbaarheid verholpen in Fortinet FortiOS", "tracking": { "current_release_date": "2024-06-14T09:59:56.652183Z", "id": "NCSC-2024-0261", "initial_release_date": "2024-06-14T09:59:56.652183Z", "revision_history": [ { "date": "2024-06-14T09:59:56.652183Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548852", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548851", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548850", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548848", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548847", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548846", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548845", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548844", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548843", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548973", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935966", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548842", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548841", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548840", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548839", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548838", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548836", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548835", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548834", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548688", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548687", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548678", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548677", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548676", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548675", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548674", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548726", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-956797", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548686", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548685", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548684", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548683", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548682", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548681", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548680", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548679", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548673", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548672", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548663", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548662", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548661", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548724", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548723", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935976", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548671", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548670", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548669", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548668", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548667", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548666", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548665", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548664", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:6.4.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548660", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548659", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548649", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548648", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548766", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-691363", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935975", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935974", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548658", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548657", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548656", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548655", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548654", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548653", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548651", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548650", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548647", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548646", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548645", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548644", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-548643", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-592974", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-691362", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-935973", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1476464", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-592973", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-691361", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-936011", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1476463", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortios:7.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555357", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555356", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555355", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-555354", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936015", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936014", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936013", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-936012", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortipam:1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-1476787", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-80581", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-80582", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-80580", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910573", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910572", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910571", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-910570", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-1476788", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-1476789", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiportal", "product": { "name": "fortiportal", "product_id": "CSAFPID-749726", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiportal:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-265532", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73422", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73411", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73407", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73399", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73424", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73458", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73448", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73438", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73447", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73435", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73395", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73419", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73413", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73408", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73434", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.1.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73432", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73390", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73440", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73437", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73394", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73421", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73459", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73446", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73404", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73430", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73420", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73428", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73402", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73444", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:1.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73392", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73457", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73397", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-318258", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73456", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-548970", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-935967", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73451", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73405", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73431", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73387", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73415", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73400", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73443", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73454", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:2.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73460", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73453", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-548638", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691404", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691403", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691402", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-838762", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-905594", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-936010", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-936009", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73439", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73409", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73418", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73425", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73398", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73441", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73449", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-171977", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73410", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73417", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-1476462", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-73388", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-446088", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-548637", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691401", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691400", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-691399", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-838761", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-1445940", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-816913", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-816914", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-838760", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiproxy", "product": { "name": "fortiproxy", "product_id": "CSAFPID-1445939", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiproxy:7.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-219732", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-956804", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-856891", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-219733", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-219730", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-493435", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-856890", "product_identification_helper": { "cpe": "cpe:2.3:a:fortinet:fortiswitchmanager:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168504", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265689", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47866", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54589", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54556", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54523", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54534", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73429", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73396", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73442", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377288", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1476846", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47883", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47888", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47871", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47892", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47859", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47880", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47864", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54593", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47891", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-47868", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73386", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73433", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73401", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73445", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377284", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-798802", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-958877", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54595", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54607", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54526", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54497", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54631", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54591", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54640", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54647", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54605", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54608", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73455", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73423", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377282", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-377286", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-816089", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-1445938", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54537", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54508", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54563", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54562", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54569", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54536", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73406", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73412", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:6.4.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168706", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54514", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168713", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168714", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168715", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-707019", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-54518", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73416", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73389", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73427", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73403", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73450", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73452", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73393", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73414", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73426", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73391", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-73436", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-168716", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265688", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265687", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-265686", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-599108", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-707018", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortios", "product": { "name": "fortios", "product_id": "CSAFPID-832162", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortios:7.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortipam", "product": { "name": "fortipam", "product_id": "CSAFPID-749703", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fortiswitchmanager", "product": { "name": "fortiswitchmanager", "product_id": "CSAFPID-1476815", "product_identification_helper": { "cpe": "cpe:2.3:o:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "fortinet" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-23110", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-548723", "CSAFPID-548688", "CSAFPID-548726", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23110", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23110.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C", "version": "3.1" }, "products": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-548723", "CSAFPID-548688", "CSAFPID-548726", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534" ] } ], "title": "CVE-2024-23110" }, { "cve": "CVE-2023-46720", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-592973", "CSAFPID-691361", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-548766", "CSAFPID-548667", "CSAFPID-935976", "CSAFPID-548679", "CSAFPID-956797", "CSAFPID-548846", "CSAFPID-935966", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46720", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46720.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X", "version": "3.1" }, "products": [ "CSAFPID-592973", "CSAFPID-691361", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-548766", "CSAFPID-548667", "CSAFPID-935976", "CSAFPID-548679", "CSAFPID-956797", "CSAFPID-548846", "CSAFPID-935966", "CSAFPID-54536", "CSAFPID-73386", "CSAFPID-54537", "CSAFPID-54497", "CSAFPID-47864", "CSAFPID-73389", "CSAFPID-73426", "CSAFPID-47868", "CSAFPID-47871", "CSAFPID-73427", "CSAFPID-73429", "CSAFPID-54589", "CSAFPID-54508", "CSAFPID-54631", "CSAFPID-54591", "CSAFPID-599108", "CSAFPID-54593", "CSAFPID-54556", "CSAFPID-47892", "CSAFPID-54514", "CSAFPID-54595", "CSAFPID-47859", "CSAFPID-54518", "CSAFPID-54562", "CSAFPID-54640", "CSAFPID-47866", "CSAFPID-54563", "CSAFPID-54523", "CSAFPID-707018", "CSAFPID-54605", "CSAFPID-54607", "CSAFPID-54526", "CSAFPID-54608", "CSAFPID-73414", "CSAFPID-47880", "CSAFPID-54569", "CSAFPID-54647", "CSAFPID-47883", "CSAFPID-73416", "CSAFPID-47888", "CSAFPID-47891", "CSAFPID-265688", "CSAFPID-54534", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845" ] } ], "title": "CVE-2023-46720" }, { "cve": "CVE-2024-21754", "cwe": { "id": "CWE-916", "name": "Use of Password Hash With Insufficient Computational Effort" }, "notes": [ { "category": "other", "text": "Use of Password Hash With Insufficient Computational Effort", "title": "CWE-916" } ], "product_status": { "known_affected": [ "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1476462", "CSAFPID-73460", "CSAFPID-936009", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-1476464", "CSAFPID-548660", "CSAFPID-935974", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-935973", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-935975", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-1445940", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-936010", "CSAFPID-905594", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21754", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21754.json" } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N/E:F/RL:X/RC:R", "version": "3.1" }, "products": [ "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1476462", "CSAFPID-73460", "CSAFPID-936009", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-1476464", "CSAFPID-548660", "CSAFPID-935974", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-935973", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-935975", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-1445940", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-936010", "CSAFPID-905594", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] } ], "title": "CVE-2024-21754" }, { "cve": "CVE-2024-31495", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "title": "CWE-89" } ], "product_status": { "known_affected": [ "CSAFPID-749726", "CSAFPID-80581", "CSAFPID-910570", "CSAFPID-80580", "CSAFPID-910571", "CSAFPID-80582", "CSAFPID-910572", "CSAFPID-910573" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31495", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31495.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-749726", "CSAFPID-80581", "CSAFPID-910570", "CSAFPID-80580", "CSAFPID-910571", "CSAFPID-80582", "CSAFPID-910572", "CSAFPID-910573" ] } ], "title": "CVE-2024-31495" }, { "cve": "CVE-2024-26010", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-936012", "CSAFPID-936015", "CSAFPID-936013", "CSAFPID-555357", "CSAFPID-555354", "CSAFPID-219733", "CSAFPID-856890", "CSAFPID-219732", "CSAFPID-856891", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-935975", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-548688", "CSAFPID-956797", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1445940", "CSAFPID-73460", "CSAFPID-905594", "CSAFPID-73392", "CSAFPID-548970", "CSAFPID-73432", "CSAFPID-73421", "CSAFPID-73447", "CSAFPID-73434", "CSAFPID-73422", "CSAFPID-73438", "CSAFPID-749703", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-936014", "CSAFPID-555355", "CSAFPID-555356", "CSAFPID-816914", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457", "CSAFPID-73394", "CSAFPID-73437", "CSAFPID-73440", "CSAFPID-73444", "CSAFPID-73402", "CSAFPID-73428", "CSAFPID-73420", "CSAFPID-73430", "CSAFPID-73404", "CSAFPID-73446", "CSAFPID-73459", "CSAFPID-73390", "CSAFPID-73408", "CSAFPID-73413", "CSAFPID-73419", "CSAFPID-73395", "CSAFPID-73435", "CSAFPID-73448", "CSAFPID-73458", "CSAFPID-73424", "CSAFPID-73399", "CSAFPID-73407", "CSAFPID-73411", "CSAFPID-493435", "CSAFPID-219730", "CSAFPID-956804", "CSAFPID-1445939", "CSAFPID-936010", "CSAFPID-935967" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26010.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:W/RC:C", "version": "3.1" }, "products": [ "CSAFPID-936012", "CSAFPID-936015", "CSAFPID-936013", "CSAFPID-555357", "CSAFPID-555354", "CSAFPID-219733", "CSAFPID-856890", "CSAFPID-219732", "CSAFPID-856891", "CSAFPID-592973", "CSAFPID-1476463", "CSAFPID-548647", "CSAFPID-935973", "CSAFPID-548660", "CSAFPID-935975", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-548688", "CSAFPID-956797", "CSAFPID-548852", "CSAFPID-935966", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-1445940", "CSAFPID-73460", "CSAFPID-905594", "CSAFPID-73392", "CSAFPID-548970", "CSAFPID-73432", "CSAFPID-73421", "CSAFPID-73447", "CSAFPID-73434", "CSAFPID-73422", "CSAFPID-73438", "CSAFPID-749703", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-936011", "CSAFPID-691361", "CSAFPID-691362", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-691363", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-548726", "CSAFPID-548674", "CSAFPID-548675", "CSAFPID-548676", "CSAFPID-548677", "CSAFPID-548678", "CSAFPID-548679", "CSAFPID-548680", "CSAFPID-548681", "CSAFPID-548682", "CSAFPID-548683", "CSAFPID-548684", "CSAFPID-548685", "CSAFPID-548686", "CSAFPID-548687", "CSAFPID-548973", "CSAFPID-548843", "CSAFPID-548844", "CSAFPID-548845", "CSAFPID-548846", "CSAFPID-548847", "CSAFPID-548848", "CSAFPID-548850", "CSAFPID-548834", "CSAFPID-548835", "CSAFPID-548836", "CSAFPID-548838", "CSAFPID-548839", "CSAFPID-548840", "CSAFPID-548841", "CSAFPID-548842", "CSAFPID-548851", "CSAFPID-936014", "CSAFPID-555355", "CSAFPID-555356", "CSAFPID-816914", "CSAFPID-838761", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-838762", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457", "CSAFPID-73394", "CSAFPID-73437", "CSAFPID-73440", "CSAFPID-73444", "CSAFPID-73402", "CSAFPID-73428", "CSAFPID-73420", "CSAFPID-73430", "CSAFPID-73404", "CSAFPID-73446", "CSAFPID-73459", "CSAFPID-73390", "CSAFPID-73408", "CSAFPID-73413", "CSAFPID-73419", "CSAFPID-73395", "CSAFPID-73435", "CSAFPID-73448", "CSAFPID-73458", "CSAFPID-73424", "CSAFPID-73399", "CSAFPID-73407", "CSAFPID-73411", "CSAFPID-493435", "CSAFPID-219730", "CSAFPID-956804", "CSAFPID-1445939", "CSAFPID-936010", "CSAFPID-935967" ] } ], "title": "CVE-2024-26010" }, { "cve": "CVE-2024-23111", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-838761", "CSAFPID-73460", "CSAFPID-838762", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23111", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23111.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R", "version": "3.1" }, "products": [ "CSAFPID-592973", "CSAFPID-936011", "CSAFPID-548647", "CSAFPID-691362", "CSAFPID-548660", "CSAFPID-691363", "CSAFPID-548673", "CSAFPID-935976", "CSAFPID-816913", "CSAFPID-838760", "CSAFPID-73410", "CSAFPID-838761", "CSAFPID-73460", "CSAFPID-838762", "CSAFPID-73392", "CSAFPID-935967", "CSAFPID-265532", "CSAFPID-168504", "CSAFPID-691361", "CSAFPID-592974", "CSAFPID-548643", "CSAFPID-548644", "CSAFPID-548645", "CSAFPID-548646", "CSAFPID-548766", "CSAFPID-548648", "CSAFPID-548649", "CSAFPID-548650", "CSAFPID-548651", "CSAFPID-548653", "CSAFPID-548654", "CSAFPID-548655", "CSAFPID-548656", "CSAFPID-548657", "CSAFPID-548658", "CSAFPID-548659", "CSAFPID-548723", "CSAFPID-548724", "CSAFPID-548661", "CSAFPID-548662", "CSAFPID-548663", "CSAFPID-548664", "CSAFPID-548665", "CSAFPID-548666", "CSAFPID-548667", "CSAFPID-548668", "CSAFPID-548669", "CSAFPID-548670", "CSAFPID-548671", "CSAFPID-548672", "CSAFPID-816914", "CSAFPID-691399", "CSAFPID-691400", "CSAFPID-691401", "CSAFPID-548637", "CSAFPID-446088", "CSAFPID-73388", "CSAFPID-73417", "CSAFPID-691402", "CSAFPID-691403", "CSAFPID-691404", "CSAFPID-548638", "CSAFPID-171977", "CSAFPID-73449", "CSAFPID-73441", "CSAFPID-73398", "CSAFPID-73425", "CSAFPID-73418", "CSAFPID-73409", "CSAFPID-73439", "CSAFPID-73453", "CSAFPID-548970", "CSAFPID-73456", "CSAFPID-318258", "CSAFPID-73397", "CSAFPID-73454", "CSAFPID-73443", "CSAFPID-73400", "CSAFPID-73415", "CSAFPID-73387", "CSAFPID-73431", "CSAFPID-73405", "CSAFPID-73451", "CSAFPID-73457" ] } ], "title": "CVE-2024-23111" } ] }
gsd-2024-23110
Vulnerability from gsd
Modified
2024-01-12 06:02
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{ "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2024-23110" ], "id": "GSD-2024-23110", "modified": "2024-01-12T06:02:17.990486Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2024-23110", "STATE": "RESERVED" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." } ] } } } }
fkie_cve-2024-23110
Vulnerability from fkie_nvd
Published
2024-06-11 15:16
Modified
2024-11-21 08:56
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands
References
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-23-460 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-23-460 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9BCDC86-176E-401A-B188-F77E22BCFC2D", "versionEndExcluding": "6.2.16", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E29353F-8791-4117-BA7A-E32FAB8348A4", "versionEndExcluding": "6.4.15", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "matchCriteriaId": "C119229A-3805-47C1-B3F9-AF1A4007A63B", "versionEndExcluding": "7.0.14", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "matchCriteriaId": "553C4BA9-953B-4017-8498-785BDA7A3006", "versionEndExcluding": "7.2.7", "versionStartIncluding": "7.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "matchCriteriaId": "757A5257-6103-4DC5-B79F-727E4279614A", "versionEndExcluding": "7.4.3", "versionStartIncluding": "7.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands" }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer basado en pila en Fortinet FortiOS versi\u00f3n 7.4.0 a 7.4.2, 7.2.0 a 7.2.6, 7.0.0 a 7.0.13, 6.4.0 a 6.4.14, 6.2.0 a 6.2.15, 6.0 todas las versiones permiten al atacante ejecutar c\u00f3digo o comandos no autorizados mediante comandos especialmente manipulados" } ], "id": "CVE-2024-23110", "lastModified": "2024-11-21T08:56:57.093", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@fortinet.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-06-11T15:16:03.707", "references": [ { "source": "psirt@fortinet.com", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-23-460" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://fortiguard.com/psirt/FG-IR-23-460" } ], "sourceIdentifier": "psirt@fortinet.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "psirt@fortinet.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ssa-832273
Vulnerability from csaf_siemens
Published
2024-03-12 00:00
Modified
2024-09-10 00:00
Summary
SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices
Notes
Summary
Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products.
Siemens has released a new version of Fortigate NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Siemens recommends to consult and implement the workarounds provided in Fortinet's upstream security notifications.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products.\nSiemens has released a new version of Fortigate NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Siemens recommends to consult and implement the workarounds provided in Fortinet\u0027s upstream security notifications.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-832273.html" }, { "category": "self", "summary": "SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-832273.json" } ], "title": "SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices", "tracking": { "current_release_date": "2024-09-10T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-832273", "initial_release_date": "2024-03-12T00:00:00Z", "revision_history": [ { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2023-42789, CVE-2023-42790, CVE-2023-46717, CVE-2024-23112 and updated remediations" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2024-23662, CVE-2023-48784, CVE-2023-41677. Adapted title to reflect latest Siemens validated release version of Fortinet NGFW" }, { "date": "2024-06-11T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added newly published upstream CVEs CVE-2023-45586, CVE-2024-26007, CVE-2023-36640, CVE-2023-45583, CVE-2023-44247, CVE-2023-46714" }, { "date": "2024-07-09T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added newly published upstream CVE CVE-2024-23110" }, { "date": "2024-09-10T00:00:00Z", "legacy_version": "1.5", "number": "6", "summary": "Added newly published upstream vulnerability CVE-2022-45862" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions with Fortinet NGFW \u003c V7.4.3", "product": { "name": "RUGGEDCOM APE1808", "product_id": "1" } }, { "category": "product_version_range", "name": "All versions with Fortinet NGFW \u003c V7.4.3 and captive portal enabled", "product": { "name": "RUGGEDCOM APE1808", "product_id": "2" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-45862", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "notes": [ { "category": "summary", "text": "An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-45862" }, { "cve": "CVE-2023-36640", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-36640" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.", "title": "Summary" }, { "category": "summary", "text": "A heap-based buffer overflow vulnerability in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \"let the host resolve the name\" could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.", "title": "For RUGGEDCOM APE1808" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "summary", "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-41677", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows attacker to execute unauthorized code or commands via targeted social engineering attack", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-41677" }, { "cve": "CVE-2023-42789", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "2" ] }, "remediations": [ { "category": "mitigation", "details": "Set a non form-based authentication scheme (see \nhttps://fortiguard.fortinet.com/psirt/FG-IR-23-328)", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "2" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "2" ] } ], "title": "CVE-2023-42789" }, { "cve": "CVE-2023-42790", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "2" ] }, "remediations": [ { "category": "mitigation", "details": "Set a non form-based authentication scheme (see \nhttps://fortiguard.fortinet.com/psirt/FG-IR-23-328)", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "2" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "2" ] } ], "title": "CVE-2023-42790" }, { "cve": "CVE-2023-44247", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free vulnerability [CWE-415] in Fortinet FortiOS before 7.0.0 may allow a privileged attacker to execute code or commands via crafted HTTP or HTTPs requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-44247" }, { "cve": "CVE-2023-44250", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "An improper privilege management vulnerability [CWE-269] in a Fortinet FortiOS HA cluster version 7.4.0 through 7.4.1 and 7.2.5 and in a FortiProxy HA cluster version 7.4.0 through 7.4.1 allows an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-44250" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45583", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-45583" }, { "cve": "CVE-2023-45586", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "An insufficient verification of data authenticity vulnerability [CWE-345] in FortiOS \u0026 FortiProxy SSL-VPN tunnel mode may allow an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-45586" }, { "cve": "CVE-2023-46714", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.1 through 7.2.6 and version 7.4.0 through 7.4.1 allows a privileged attacker over the administrative interface to execute arbitrary code or commands via crafted HTTP or HTTPs requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-46714" }, { "cve": "CVE-2023-46717", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2.6 and below, and versions 7.0.12 and below when configured with FortiAuthenticator in HA may allow a readonly user to gain read-write access via successive login attempts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-46717" }, { "cve": "CVE-2023-47537", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "An improper certificate validation vulnerability in Fortinet FortiOS 7.0.0 - 7.0.13, 7.2.0 - 7.2.6 and 7.4.0 - 7.4.1 allows a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the FortiLink communication channel between the FortiOS device and FortiSwitch.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-47537" }, { "cve": "CVE-2023-48784", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A\u00a0use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.1 and below, version 7.2.7 and below, version 7.0.14 and below, version 6.4.15 and below command line interface may allow a local\u00a0privileged attacker with super-admin profile and CLI access\u00a0to execute arbitrary code or commands via specially crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-48784" }, { "cve": "CVE-2024-21762", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Disable SSL VPN (disable webmode is NOT a valid workaround) (see \nhttps://www.fortiguard.com/psirt/FG-IR-24-015)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-21762" }, { "cve": "CVE-2024-23110", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23110" }, { "cve": "CVE-2024-23112", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "summary", "text": "An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user\u2019s bookmark via URL manipulation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23112" }, { "cve": "CVE-2024-23113", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A use of externally-controlled format string vulnerability [CWE-134] in FortiOS fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "For each interface, remove the fgfm access (see \nhttps://www.fortiguard.com/psirt/FG-IR-24-029)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23113" }, { "cve": "CVE-2024-23662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiOS at least version at least 7.4.0 through 7.4.1 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.15 and 6.4.0 through 6.4.15 allows attacker to information disclosure via HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23662" }, { "cve": "CVE-2024-26007", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "An improper check or handling of exceptional conditions vulnerability [CWE-703] in Fortinet FortiOS version 7.4.1 allows an unauthenticated attacker to provoke a denial of service on the administrative interface via crafted HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-26007" } ] }
SSA-832273
Vulnerability from csaf_siemens
Published
2024-03-12 00:00
Modified
2024-09-10 00:00
Summary
SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices
Notes
Summary
Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products.
Siemens has released a new version of Fortigate NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Siemens recommends to consult and implement the workarounds provided in Fortinet's upstream security notifications.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Fortinet has published information on vulnerabilities in FORTIOS. This advisory lists the related Siemens Industrial products.\nSiemens has released a new version of Fortigate NGFW for RUGGEDCOM APE1808 and recommends to update to the latest version. Siemens recommends to consult and implement the workarounds provided in Fortinet\u0027s upstream security notifications.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-832273.html" }, { "category": "self", "summary": "SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-832273.json" } ], "title": "SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices", "tracking": { "current_release_date": "2024-09-10T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-832273", "initial_release_date": "2024-03-12T00:00:00Z", "revision_history": [ { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2023-42789, CVE-2023-42790, CVE-2023-46717, CVE-2024-23112 and updated remediations" }, { "date": "2024-05-14T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2024-23662, CVE-2023-48784, CVE-2023-41677. Adapted title to reflect latest Siemens validated release version of Fortinet NGFW" }, { "date": "2024-06-11T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added newly published upstream CVEs CVE-2023-45586, CVE-2024-26007, CVE-2023-36640, CVE-2023-45583, CVE-2023-44247, CVE-2023-46714" }, { "date": "2024-07-09T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added newly published upstream CVE CVE-2024-23110" }, { "date": "2024-09-10T00:00:00Z", "legacy_version": "1.5", "number": "6", "summary": "Added newly published upstream vulnerability CVE-2022-45862" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "All versions with Fortinet NGFW \u003c V7.4.3", "product": { "name": "RUGGEDCOM APE1808", "product_id": "1" } }, { "category": "product_version_range", "name": "All versions with Fortinet NGFW \u003c V7.4.3 and captive portal enabled", "product": { "name": "RUGGEDCOM APE1808", "product_id": "2" } } ], "category": "product_name", "name": "RUGGEDCOM APE1808" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-45862", "cwe": { "id": "CWE-613", "name": "Insufficient Session Expiration" }, "notes": [ { "category": "summary", "text": "An insufficient session expiration vulnerability [CWE-613] vulnerability in FortiOS 7.2.5 and below, 7.0 all versions, 6.4 all versions; FortiProxy 7.2 all versions, 7.0 all versions; FortiPAM 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions; FortiSwitchManager 7.2.1 and below, 7.0 all versions GUI may allow attackers to re-use websessions after GUI logout, should they manage to acquire the required credentials.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-45862" }, { "cve": "CVE-2023-36640", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiPAM versions 1.0.0 through 1.0.3, FortiOS versions 7.2.0, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.16 allows attacker to execute unauthorized code or commands via specially crafted commands", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-36640" }, { "cve": "CVE-2023-38545", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake.\r\n\r\nWhen curl is asked to pass along the hostname to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that hostname can be is 255 bytes.\r\n\r\nIf the hostname is detected to be longer than 255 bytes, curl switches to local name resolving and instead passes on the resolved address only to the proxy. Due to a bug, the local variable that means \"let the host resolve the name\" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long hostname to the target buffer instead of copying just the resolved address there.", "title": "Summary" }, { "category": "summary", "text": "A heap-based buffer overflow vulnerability in the SOCKS5 proxy handshake in the Curl package. If Curl is unable to resolve the address itself, it passes the hostname to the SOCKS5 proxy. However, the maximum length of the hostname that can be passed is 255 bytes. If the hostname is longer, then Curl switches to the local name resolving and passes the resolved address only to the proxy. The local variable that instructs Curl to \"let the host resolve the name\" could obtain the wrong value during a slow SOCKS5 handshake, resulting in the too-long hostname being copied to the target buffer instead of the resolved address, which was not the intended behavior.", "title": "For RUGGEDCOM APE1808" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-38545" }, { "cve": "CVE-2023-38546", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "summary", "text": "This flaw allows an attacker to insert cookies at will into a running program\r\nusing libcurl, if the specific series of conditions are met.\r\n\r\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\r\nthat are the individual handles for single transfers.\r\n\r\nlibcurl provides a function call that duplicates en easy handle called\r\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\r\n\r\nIf a transfer has cookies enabled when the handle is duplicated, the\r\ncookie-enable state is also cloned - but without cloning the actual\r\ncookies. If the source handle did not read any cookies from a specific file on\r\ndisk, the cloned version of the handle would instead store the file name as\r\n`none` (using the four ASCII letters, no quotes).\r\n\r\nSubsequent use of the cloned handle that does not explicitly set a source to\r\nload cookies from would then inadvertently load cookies from a file named\r\n`none` - if such a file exists and is readable in the current directory of the\r\nprogram using libcurl. And if using the correct file format of course.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-38546" }, { "cve": "CVE-2023-41677", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "A insufficiently protected credentials in Fortinet FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17 allows attacker to execute unauthorized code or commands via targeted social engineering attack", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-41677" }, { "cve": "CVE-2023-42789", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "2" ] }, "remediations": [ { "category": "mitigation", "details": "Set a non form-based authentication scheme (see \nhttps://fortiguard.fortinet.com/psirt/FG-IR-23-328)", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "2" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "2" ] } ], "title": "CVE-2023-42789" }, { "cve": "CVE-2023-42790", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "2" ] }, "remediations": [ { "category": "mitigation", "details": "Set a non form-based authentication scheme (see \nhttps://fortiguard.fortinet.com/psirt/FG-IR-23-328)", "product_ids": [ "2" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "2" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "2" ] } ], "title": "CVE-2023-42790" }, { "cve": "CVE-2023-44247", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free vulnerability [CWE-415] in Fortinet FortiOS before 7.0.0 may allow a privileged attacker to execute code or commands via crafted HTTP or HTTPs requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-44247" }, { "cve": "CVE-2023-44250", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "An improper privilege management vulnerability [CWE-269] in a Fortinet FortiOS HA cluster version 7.4.0 through 7.4.1 and 7.2.5 and in a FortiProxy HA cluster version 7.4.0 through 7.4.1 allows an authenticated attacker to perform elevated actions via crafted HTTP or HTTPS requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-44250" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45583", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.5, 7.0.0 through 7.0.11, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 FortiPAM versions 1.1.0, 1.0.0 through 1.0.3 FortiOS versions 7.4.0, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15 FortiSwitchManager versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.2 allows attacker to execute unauthorized code or commands via specially crafted cli commands and http requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-45583" }, { "cve": "CVE-2023-45586", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "An insufficient verification of data authenticity vulnerability [CWE-345] in FortiOS \u0026 FortiProxy SSL-VPN tunnel mode may allow an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-45586" }, { "cve": "CVE-2023-46714", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.1 through 7.2.6 and version 7.4.0 through 7.4.1 allows a privileged attacker over the administrative interface to execute arbitrary code or commands via crafted HTTP or HTTPs requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-46714" }, { "cve": "CVE-2023-46717", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An improper authentication vulnerability [CWE-287] in FortiOS versions 7.4.1 and below, versions 7.2.6 and below, and versions 7.0.12 and below when configured with FortiAuthenticator in HA may allow a readonly user to gain read-write access via successive login attempts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-46717" }, { "cve": "CVE-2023-47537", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "An improper certificate validation vulnerability in Fortinet FortiOS 7.0.0 - 7.0.13, 7.2.0 - 7.2.6 and 7.4.0 - 7.4.1 allows a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the FortiLink communication channel between the FortiOS device and FortiSwitch.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-47537" }, { "cve": "CVE-2023-48784", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A\u00a0use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.1 and below, version 7.2.7 and below, version 7.0.14 and below, version 6.4.15 and below command line interface may allow a local\u00a0privileged attacker with super-admin profile and CLI access\u00a0to execute arbitrary code or commands via specially crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RC:R", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-48784" }, { "cve": "CVE-2024-21762", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "Disable SSL VPN (disable webmode is NOT a valid workaround) (see \nhttps://www.fortiguard.com/psirt/FG-IR-24-015)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-21762" }, { "cve": "CVE-2024-23110", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23110" }, { "cve": "CVE-2024-23112", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "summary", "text": "An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user\u2019s bookmark via URL manipulation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23112" }, { "cve": "CVE-2024-23113", "cwe": { "id": "CWE-134", "name": "Use of Externally-Controlled Format String" }, "notes": [ { "category": "summary", "text": "A use of externally-controlled format string vulnerability [CWE-134] in FortiOS fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "mitigation", "details": "For each interface, remove the fgfm access (see \nhttps://www.fortiguard.com/psirt/FG-IR-24-029)", "product_ids": [ "1" ] }, { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23113" }, { "cve": "CVE-2024-23662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiOS at least version at least 7.4.0 through 7.4.1 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.15 and 6.4.0 through 6.4.15 allows attacker to information disclosure via HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-23662" }, { "cve": "CVE-2024-26007", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "An improper check or handling of exceptional conditions vulnerability [CWE-703] in Fortinet FortiOS version 7.4.1 allows an unauthenticated attacker to provoke a denial of service on the administrative interface via crafted HTTP requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update Fortigate NGFW to V7.4.3. Contact customer support to receive patch and update information.", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-26007" } ] }
WID-SEC-W-2024-1358
Vulnerability from csaf_certbund
Published
2024-06-11 22:00
Modified
2024-06-11 22:00
Summary
Fortinet FortiOS: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FortiOS ist ein gehärtetes Betriebssystem für FortiGate Plattformen.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Fortinet FortiOS ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Hardware Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FortiOS ist ein geh\u00e4rtetes Betriebssystem f\u00fcr FortiGate Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Fortinet FortiOS ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1358 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1358.json" }, { "category": "self", "summary": "WID-SEC-2024-1358 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1358" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-23-356 vom 2024-06-11", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-356" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-23-460 vom 2024-06-11", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-460" } ], "source_lang": "en-US", "title": "Fortinet FortiOS: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-06-11T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:10:07.605+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1358", "initial_release_date": "2024-06-11T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=6.2.16", "product": { "name": "Fortinet FortiOS \u003c=6.2.16", "product_id": "1596176" } }, { "category": "product_version_range", "name": "\u003c7.2.8", "product": { "name": "Fortinet FortiOS \u003c7.2.8", "product_id": "1607630" } }, { "category": "product_version", "name": "6", "product": { "name": "Fortinet FortiOS 6.0", "product_id": "T014711", "product_identification_helper": { "cpe": "cpe:/o:fortinet:fortios:6.0" } } }, { "category": "product_version_range", "name": "\u003c7.4.4", "product": { "name": "Fortinet FortiOS \u003c7.4.4", "product_id": "T035335" } }, { "category": "product_version_range", "name": "\u003c=7.0.13", "product": { "name": "Fortinet FortiOS \u003c=7.0.13", "product_id": "T035339" } }, { "category": "product_version_range", "name": "\u003c=6.4.15", "product": { "name": "Fortinet FortiOS \u003c=6.4.15", "product_id": "T035340" } } ], "category": "product_name", "name": "FortiOS" } ], "category": "vendor", "name": "Fortinet" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-46720", "notes": [ { "category": "description", "text": "Es gibt mehrere stapelbasierte Puffer\u00fcberlaufschwachstellen in Fortinet FortiOS. Ein lokaler Angreifer kann diese Fehler \u00fcber die Befehlszeilenschnittstelle ausnutzen, um beliebigen Code oder Befehle auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T014711" ], "last_affected": [ "T035339", "1596176", "T035340" ] }, "release_date": "2024-06-11T22:00:00.000+00:00", "title": "CVE-2023-46720" }, { "cve": "CVE-2024-23110", "notes": [ { "category": "description", "text": "Es gibt mehrere stapelbasierte Puffer\u00fcberlaufschwachstellen in Fortinet FortiOS. Ein lokaler Angreifer kann diese Fehler \u00fcber die Befehlszeilenschnittstelle ausnutzen, um beliebigen Code oder Befehle auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T014711" ], "last_affected": [ "T035339", "1596176", "T035340" ] }, "release_date": "2024-06-11T22:00:00.000+00:00", "title": "CVE-2024-23110" } ] }
wid-sec-w-2024-1358
Vulnerability from csaf_certbund
Published
2024-06-11 22:00
Modified
2024-06-11 22:00
Summary
Fortinet FortiOS: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FortiOS ist ein gehärtetes Betriebssystem für FortiGate Plattformen.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Fortinet FortiOS ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
- Hardware Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FortiOS ist ein geh\u00e4rtetes Betriebssystem f\u00fcr FortiGate Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Fortinet FortiOS ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware\n- Hardware Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1358 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1358.json" }, { "category": "self", "summary": "WID-SEC-2024-1358 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1358" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-23-356 vom 2024-06-11", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-356" }, { "category": "external", "summary": "FortiGuard Labs PSIRT Advisory FG-IR-23-460 vom 2024-06-11", "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-460" } ], "source_lang": "en-US", "title": "Fortinet FortiOS: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-06-11T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:10:07.605+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1358", "initial_release_date": "2024-06-11T22:00:00.000+00:00", "revision_history": [ { "date": "2024-06-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=6.2.16", "product": { "name": "Fortinet FortiOS \u003c=6.2.16", "product_id": "1596176" } }, { "category": "product_version_range", "name": "\u003c7.2.8", "product": { "name": "Fortinet FortiOS \u003c7.2.8", "product_id": "1607630" } }, { "category": "product_version", "name": "6", "product": { "name": "Fortinet FortiOS 6.0", "product_id": "T014711", "product_identification_helper": { "cpe": "cpe:/o:fortinet:fortios:6.0" } } }, { "category": "product_version_range", "name": "\u003c7.4.4", "product": { "name": "Fortinet FortiOS \u003c7.4.4", "product_id": "T035335" } }, { "category": "product_version_range", "name": "\u003c=7.0.13", "product": { "name": "Fortinet FortiOS \u003c=7.0.13", "product_id": "T035339" } }, { "category": "product_version_range", "name": "\u003c=6.4.15", "product": { "name": "Fortinet FortiOS \u003c=6.4.15", "product_id": "T035340" } } ], "category": "product_name", "name": "FortiOS" } ], "category": "vendor", "name": "Fortinet" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-46720", "notes": [ { "category": "description", "text": "Es gibt mehrere stapelbasierte Puffer\u00fcberlaufschwachstellen in Fortinet FortiOS. Ein lokaler Angreifer kann diese Fehler \u00fcber die Befehlszeilenschnittstelle ausnutzen, um beliebigen Code oder Befehle auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T014711" ], "last_affected": [ "T035339", "1596176", "T035340" ] }, "release_date": "2024-06-11T22:00:00.000+00:00", "title": "CVE-2023-46720" }, { "cve": "CVE-2024-23110", "notes": [ { "category": "description", "text": "Es gibt mehrere stapelbasierte Puffer\u00fcberlaufschwachstellen in Fortinet FortiOS. Ein lokaler Angreifer kann diese Fehler \u00fcber die Befehlszeilenschnittstelle ausnutzen, um beliebigen Code oder Befehle auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T014711" ], "last_affected": [ "T035339", "1596176", "T035340" ] }, "release_date": "2024-06-11T22:00:00.000+00:00", "title": "CVE-2024-23110" } ] }
ghsa-4xv7-gmf4-mjpg
Vulnerability from github
Published
2024-06-11 15:31
Modified
2024-06-11 15:31
Severity ?
Details
A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands
{ "affected": [], "aliases": [ "CVE-2024-23110" ], "database_specific": { "cwe_ids": [ "CWE-121", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-06-11T15:16:03Z", "severity": "HIGH" }, "details": "A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0 all versions allows attacker to execute unauthorized code or commands via specially crafted commands", "id": "GHSA-4xv7-gmf4-mjpg", "modified": "2024-06-11T15:31:15Z", "published": "2024-06-11T15:31:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23110" }, { "type": "WEB", "url": "https://fortiguard.com/psirt/FG-IR-23-460" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.