A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-074 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-074 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-074 - Vendor Advisory |
03 Jul 2023, 18:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-502 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Fortinet fortinac
Fortinet |
|
CPE | cpe:2.3:a:fortinet:fortinac:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortinac:9.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortinac:9.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortinac:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortinac:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortinac:9.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortinac:8.3.7:*:*:*:*:*:*:* |
|
References | (MISC) https://fortiguard.com/psirt/FG-IR-23-074 - Vendor Advisory |
23 Jun 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-23 08:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33299
Mitre link : CVE-2023-33299
CVE.ORG link : CVE-2023-33299
JSON object : View
Products Affected
fortinet
- fortinac
CWE
CWE-502
Deserialization of Untrusted Data