- Description
- A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
- Products
- fortios, fortipam, fortiproxy, fortiweb, fortisra
CVSS 3.1
- Type
- Secondary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- psirt@fortinet.com
- CWE-134
- Hype score
- Not currently trending
Fortinet複数製品に影響する脆弱性の情報更新について アドバイザリID:FG-IR-24-325 CVSSv3スコア範囲: 7.0 発行日:2025年3月11日 更新日:2025年5月14日 CVE番号:CVE-2024-45324 概要 FortiOS、FortiProxy、FortiPAM、FortiSRA、
@esunekk
15 May 2025
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
به تازگی برای محصولات FortiSandbox و FortiOS آسیب پذیری های مختلفی با کدهای شناسایی CVE-2024-54027 از نوع OS command execution و CVE-2024-45324 از نوع Format string منتشر شده است. https://t.co/Poz3aKY03t https://t.co/FtYUYJTIy0
@AmirHossein_sec
15 Mar 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Upozorňujeme na sérii zranitelností v produktech Fortinet. CVE-2024-45324 - zranitelnost typu "Use of Externally-Controlled Format String" umožňuje oprávněnému útočníkovi spustit neautorizované příkazy pomocí speciálně vytvořených HTTP/HTTPS příkazů. Postižené produkty:… http
@GOVCERT_CZ
13 Mar 2025
1413 Impressions
2 Retweets
7 Likes
1 Bookmark
2 Replies
2 Quotes
Fortinet Addresses Multiple Vulnerabilities in FortiSandbox, FortiOS | Read more: https://t.co/OQPWF08TOo 📌 OS Command vulnerability – CVE-2024-52961 📌 Incorrect authorization vulnerability – CVE-2024-45328 📌 Format String Vulnerability – CVE-2024-45324 📌 SQL injection… http
@The_Cyber_News
13 Mar 2025
278 Impressions
0 Retweets
0 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-45324 🔴 HIGH (7) 🏢 Fortinet - FortiPAM 🏗️ 1.4.0 🔗 https://t.co/xeKj45lPy3 #CyberCron #VulnAlert #InfoSec https://t.co/vsfj6Zaak3
@cybercronai
12 Mar 2025
90 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
1 Quote
CVE-2024-45324 A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15… https://t.co/rsWpSc8Q1s
@CVEnew
11 Mar 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCCC7410-CFB4-4E3B-8B1D-8FAEDCBD46DC",
"versionEndExcluding": "6.2.17",
"versionStartIncluding": "6.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B481963F-0415-42C8-BB38-C1A8BDF4B9F7",
"versionEndExcluding": "6.4.16",
"versionStartIncluding": "6.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EAE013D-7AE4-4C7A-81A0-296FE00F12CD",
"versionEndExcluding": "7.0.16",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7D031B-221B-4738-AC83-4FB92A106528",
"versionEndExcluding": "7.2.10",
"versionStartIncluding": "7.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2",
"versionEndExcluding": "7.4.5",
"versionStartIncluding": "7.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6AC9224-3994-4D38-B823-404AA8A2A854",
"versionEndIncluding": "1.3.1",
"versionStartIncluding": "1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6142E55A-E939-4E25-BFB3-D7C97FACAD62",
"versionEndExcluding": "1.4.3",
"versionStartIncluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B14CD59-F557-48A0-8458-BECD3AD7DB3A",
"versionEndExcluding": "7.0.20",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC18768-0891-465E-9900-3DF5D22A5CB3",
"versionEndExcluding": "7.2.13",
"versionStartIncluding": "7.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5029368F-7632-40BF-87A8-202FB3B3A571",
"versionEndExcluding": "7.4.7",
"versionStartIncluding": "7.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C1A9E35E-AA55-44C4-BAAC-2E44E6DCE2EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7E739890-CFEA-4B7B-B78D-8CC8157BDF54",
"versionEndExcluding": "7.0.11",
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B642678E-4E31-4A6B-A791-ACD5D332B175",
"versionEndExcluding": "7.2.11",
"versionStartIncluding": "7.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C1BD145-AA4F-4264-B996-1BEC7B282EBE",
"versionEndExcluding": "7.4.6",
"versionStartIncluding": "7.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28B43375-DA74-4C5F-BAEE-39F312EEF51F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortisra:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E56CAA8-088C-4116-9C3B-A2E53A2BB82B",
"versionEndExcluding": "1.4.3",
"versionStartIncluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]