Lucene search

K
cveFortinetCVE-2023-25607
HistoryOct 10, 2023 - 5:15 p.m.

CVE-2023-25607

2023-10-1017:15:11
CWE-78
fortinet
web.nvd.nist.gov
40
cve-2023-25607
os command injection
fortimanager
fortianalyzer
fortiadc
cwe-78
nvd
security vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

High

EPSS

0

Percentile

9.6%

An improper neutralization of special elements used in an OS Command (โ€˜OS Command Injectionโ€™) vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADCย  7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafeย usage of the wordexp function.

Affected configurations

Nvd
Node
fortinetfortiadcRange6.0.0โ€“6.0.4
OR
fortinetfortiadcRange6.1.0โ€“6.1.6
OR
fortinetfortiadcRange6.2.0โ€“6.2.6
OR
fortinetfortiadcRange7.0.0โ€“7.0.3
OR
fortinetfortiadcMatch7.1.0
OR
fortinetfortianalyzerRange6.0.0โ€“6.0.12
OR
fortinetfortianalyzerRange6.2.0โ€“6.2.12
OR
fortinetfortianalyzerRange6.4.0โ€“6.4.11
OR
fortinetfortianalyzerRange7.0.0โ€“7.0.7
OR
fortinetfortianalyzerMatch7.2.1
OR
fortinetfortianalyzerMatch7.2.2
OR
fortinetfortimanagerRange6.0.0โ€“6.0.12
OR
fortinetfortimanagerRange6.2.0โ€“6.2.12
OR
fortinetfortimanagerRange6.4.0โ€“6.4.11
OR
fortinetfortimanagerRange7.0.0โ€“7.0.7
OR
fortinetfortimanagerMatch7.2.0
OR
fortinetfortimanagerMatch7.2.1
OR
fortinetfortimanagerMatch7.2.2
VendorProductVersionCPE
fortinetfortiadc*cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
fortinetfortiadc7.1.0cpe:2.3:a:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*
fortinetfortianalyzer*cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
fortinetfortianalyzer7.2.1cpe:2.3:a:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*
fortinetfortianalyzer7.2.2cpe:2.3:a:fortinet:fortianalyzer:7.2.2:*:*:*:*:*:*:*
fortinetfortimanager*cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
fortinetfortimanager7.2.0cpe:2.3:a:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*
fortinetfortimanager7.2.1cpe:2.3:a:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*
fortinetfortimanager7.2.2cpe:2.3:a:fortinet:fortimanager:7.2.2:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiAnalyzer",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.11",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.12",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.12",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiManager",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.11",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.12",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.12",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiADC",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "7.1.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.1.0",
        "lessThanOrEqual": "6.1.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.4",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

High

EPSS

0

Percentile

9.6%

Related for CVE-2023-25607