/

CVE-2024-23113 Report - Details, Severity, & Advisorie...

CVE-2024-23113 Report - Details, Severity, & Advisories

Twingate Team

May 30, 2024

What is CVE-2024-23113?

CVE-2024-23113 is a critical vulnerability affecting various Fortinet software, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. This security flaw allows an attacker to execute unauthorized code or commands through specially crafted packets, posing a significant risk to affected systems. The vulnerability impacts a wide range of software versions, making it essential for organizations using these products to take appropriate action to mitigate the threat and protect their systems.

Who is impacted?

The CVE-2024-23113 vulnerability affects users of various Fortinet software, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. Specifically, impacted versions are FortiOS 7.4.0-7.4.2, 7.2.0-7.2.6, and 7.0.0-7.0.13; FortiProxy 7.4.0-7.4.2, 7.2.0-7.2.8, and 7.0.0-7.0.14; FortiPAM 1.2.0, 1.1.0-1.1.2, and 1.0.0-1.0.3; and FortiSwitchManager 7.2.0-7.2.3 and 7.0.0-7.0.3. This security flaw allows attackers to execute unauthorized code or commands through specially crafted packets, posing a significant risk to the affected systems.

What to do if CVE-2024-23113 affected you?

If you're affected by the CVE-2024-23113 vulnerability, it's crucial to take action to protect your systems. Follow these simple steps:

  1. Upgrade affected Fortinet software to fixed releases.

  2. Remove fgfm access for each interface as a workaround.

  3. Use the Fortinet upgrade tool to follow the recommended upgrade path.

Is it in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, CVE-2024-23113 is in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, named "Use of Externally-Controlled Format String," was added on February 15, 2024. To address this critical issue, users are advised to update their affected Fortinet products to the latest versions.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-134, which involves the use of externally-controlled format strings, affecting Fortinet software.

Learn More

CVE-2024-23113 is a critical vulnerability affecting various Fortinet software, posing significant risks to affected systems. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD page or the sources listed below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2024-23113 Report - Details, Severity, & Advisorie...

CVE-2024-23113 Report - Details, Severity, & Advisories

Twingate Team

May 30, 2024

What is CVE-2024-23113?

CVE-2024-23113 is a critical vulnerability affecting various Fortinet software, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. This security flaw allows an attacker to execute unauthorized code or commands through specially crafted packets, posing a significant risk to affected systems. The vulnerability impacts a wide range of software versions, making it essential for organizations using these products to take appropriate action to mitigate the threat and protect their systems.

Who is impacted?

The CVE-2024-23113 vulnerability affects users of various Fortinet software, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. Specifically, impacted versions are FortiOS 7.4.0-7.4.2, 7.2.0-7.2.6, and 7.0.0-7.0.13; FortiProxy 7.4.0-7.4.2, 7.2.0-7.2.8, and 7.0.0-7.0.14; FortiPAM 1.2.0, 1.1.0-1.1.2, and 1.0.0-1.0.3; and FortiSwitchManager 7.2.0-7.2.3 and 7.0.0-7.0.3. This security flaw allows attackers to execute unauthorized code or commands through specially crafted packets, posing a significant risk to the affected systems.

What to do if CVE-2024-23113 affected you?

If you're affected by the CVE-2024-23113 vulnerability, it's crucial to take action to protect your systems. Follow these simple steps:

  1. Upgrade affected Fortinet software to fixed releases.

  2. Remove fgfm access for each interface as a workaround.

  3. Use the Fortinet upgrade tool to follow the recommended upgrade path.

Is it in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, CVE-2024-23113 is in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, named "Use of Externally-Controlled Format String," was added on February 15, 2024. To address this critical issue, users are advised to update their affected Fortinet products to the latest versions.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-134, which involves the use of externally-controlled format strings, affecting Fortinet software.

Learn More

CVE-2024-23113 is a critical vulnerability affecting various Fortinet software, posing significant risks to affected systems. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD page or the sources listed below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2024-23113 Report - Details, Severity, & Advisories

Twingate Team

May 30, 2024

What is CVE-2024-23113?

CVE-2024-23113 is a critical vulnerability affecting various Fortinet software, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. This security flaw allows an attacker to execute unauthorized code or commands through specially crafted packets, posing a significant risk to affected systems. The vulnerability impacts a wide range of software versions, making it essential for organizations using these products to take appropriate action to mitigate the threat and protect their systems.

Who is impacted?

The CVE-2024-23113 vulnerability affects users of various Fortinet software, including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. Specifically, impacted versions are FortiOS 7.4.0-7.4.2, 7.2.0-7.2.6, and 7.0.0-7.0.13; FortiProxy 7.4.0-7.4.2, 7.2.0-7.2.8, and 7.0.0-7.0.14; FortiPAM 1.2.0, 1.1.0-1.1.2, and 1.0.0-1.0.3; and FortiSwitchManager 7.2.0-7.2.3 and 7.0.0-7.0.3. This security flaw allows attackers to execute unauthorized code or commands through specially crafted packets, posing a significant risk to the affected systems.

What to do if CVE-2024-23113 affected you?

If you're affected by the CVE-2024-23113 vulnerability, it's crucial to take action to protect your systems. Follow these simple steps:

  1. Upgrade affected Fortinet software to fixed releases.

  2. Remove fgfm access for each interface as a workaround.

  3. Use the Fortinet upgrade tool to follow the recommended upgrade path.

Is it in CISA’s Known Exploited Vulnerabilities Catalog?

Yes, CVE-2024-23113 is in CISA's Known Exploited Vulnerabilities Catalog. The vulnerability, named "Use of Externally-Controlled Format String," was added on February 15, 2024. To address this critical issue, users are advised to update their affected Fortinet products to the latest versions.

Weakness Enumeration

The weakness enumeration for this vulnerability is categorized as CWE-134, which involves the use of externally-controlled format strings, affecting Fortinet software.

Learn More

CVE-2024-23113 is a critical vulnerability affecting various Fortinet software, posing significant risks to affected systems. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD page or the sources listed below.