CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.2%
Multiple buffer copy without checking size of input (‘classic buffer overflow’) vulnerabilities [CWE-120] in FortiADC version 7.2.0 and before 7.1.2 & FortiDDoS-F version 6.5.0 and before 6.4.1 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI requests.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortiadc | * | cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:* |
fortinet | fortiadc | 5.2.0 | cpe:2.3:a:fortinet:fortiadc:5.2.0:-:*:*:*:*:*:* |
fortinet | fortiadc | 5.3.0 | cpe:2.3:a:fortinet:fortiadc:5.3.0:-:*:*:*:*:*:* |
fortinet | fortiadc | 5.4.0 | cpe:2.3:a:fortinet:fortiadc:5.4.0:-:*:*:*:*:*:* |
fortinet | fortiadc | 6.0.0 | cpe:2.3:a:fortinet:fortiadc:6.0.0:-:*:*:*:*:*:* |
fortinet | fortiadc | 6.1.0 | cpe:2.3:a:fortinet:fortiadc:6.1.0:-:*:*:*:*:*:* |
fortinet | fortiadc | 6.2.0 | cpe:2.3:a:fortinet:fortiadc:6.2.0:-:*:*:*:*:*:* |
fortinet | fortiadc | 7.0.0 | cpe:2.3:a:fortinet:fortiadc:7.0.0:-:*:*:*:*:*:* |
fortinet | fortiadc | 7.2.0 | cpe:2.3:a:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:* |
fortinet | fortiddos-f | * | cpe:2.3:a:fortinet:fortiddos-f:*:*:*:*:*:*:*:* |