← Back to CVEs
CVE-2024-23113
CRITICALCISA KEV9.8
Description
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/15/2024
Last Modified10/24/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorFortinet
ProductMultiple Products
Vulnerability NameFortinet Multiple Products Format String Vulnerability
KEV Date Added2024-10-09
Remediation Due Date2024-10-30
Ransomware UseUnknown
Affected Products
fortinet:fortiosfortinet:fortipamfortinet:fortiproxyfortinet:fortiswitchmanager
Weaknesses (CWE)
CWE-134
References
https://fortiguard.com/psirt/FG-IR-24-029(psirt@fortinet.com)
https://fortiguard.com/psirt/FG-IR-24-029(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-23113(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.