Lucene search

K
cveFortinetCVE-2023-29177
HistoryNov 14, 2023 - 7:15 p.m.

CVE-2023-29177

2023-11-1419:15:24
CWE-120
fortinet
web.nvd.nist.gov
23
security
fortiadc
fortiddos-f
buffer overflow
cwe-120
cve-2023-29177

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

5.2%

Multiple buffer copy without checking size of input (‘classic buffer overflow’) vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.

Affected configurations

Nvd
Node
fortinetfortiadcRange7.1.07.1.2
OR
fortinetfortiadcMatch5.2.0-
OR
fortinetfortiadcMatch5.3.0-
OR
fortinetfortiadcMatch5.4.0-
OR
fortinetfortiadcMatch6.0.0-
OR
fortinetfortiadcMatch6.1.0-
OR
fortinetfortiadcMatch6.2.0-
OR
fortinetfortiadcMatch7.0.0-
OR
fortinetfortiadcMatch7.2.0
Node
fortinetfortiddos-fRange6.1.06.1.4
OR
fortinetfortiddos-fRange6.4.06.4.1
OR
fortinetfortiddos-fMatch6.2.0-
OR
fortinetfortiddos-fMatch6.3.0-
OR
fortinetfortiddos-fMatch6.5.0
VendorProductVersionCPE
fortinetfortiadc*cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
fortinetfortiadc5.2.0cpe:2.3:a:fortinet:fortiadc:5.2.0:-:*:*:*:*:*:*
fortinetfortiadc5.3.0cpe:2.3:a:fortinet:fortiadc:5.3.0:-:*:*:*:*:*:*
fortinetfortiadc5.4.0cpe:2.3:a:fortinet:fortiadc:5.4.0:-:*:*:*:*:*:*
fortinetfortiadc6.0.0cpe:2.3:a:fortinet:fortiadc:6.0.0:-:*:*:*:*:*:*
fortinetfortiadc6.1.0cpe:2.3:a:fortinet:fortiadc:6.1.0:-:*:*:*:*:*:*
fortinetfortiadc6.2.0cpe:2.3:a:fortinet:fortiadc:6.2.0:-:*:*:*:*:*:*
fortinetfortiadc7.0.0cpe:2.3:a:fortinet:fortiadc:7.0.0:-:*:*:*:*:*:*
fortinetfortiadc7.2.0cpe:2.3:a:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*
fortinetfortiddos-f*cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 131

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiDDoS-F",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "6.5.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.3.0",
        "lessThanOrEqual": "6.3.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.1.0",
        "lessThanOrEqual": "6.1.4",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Fortinet",
    "product": "FortiADC",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "version": "7.2.0",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.1.0",
        "lessThanOrEqual": "7.1.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.5",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.2.0",
        "lessThanOrEqual": "6.2.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.1.0",
        "lessThanOrEqual": "6.1.6",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.0.0",
        "lessThanOrEqual": "6.0.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.4.0",
        "lessThanOrEqual": "5.4.5",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.3.0",
        "lessThanOrEqual": "5.3.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "5.2.0",
        "lessThanOrEqual": "5.2.8",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

5.2%

Related for CVE-2023-29177