In practice, exploitation of this vulnerability is nuanced, and not all vulnerable versions are exploitable due to requiring certificates which can only be configured by an administrator. As such, and as per this full writeup, the real-world risk is likely lower than its CVSS score suggests.
- Description
- A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Fortinet Multiple Products Format String Vulnerability
- Exploit added on
- Oct 9, 2024
- Exploit action due
- Oct 30, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- psirt@fortinet.com
- CWE-134
- Hype score
- Not currently trending
Morning friends!😇Putting together some beginner lessons on Format string vulnerability exploits.🙂Made a fun C program game for us to practice on.🙂As you can see we leaked the super secret password.🙂 If we look at CVE-2024-23113 with Fortinet we find the same sort of string…
@LeighGi66657535
27 Nov 2024
197 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
17 Nov 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-23113 2 - CVE-2024-7965 3 - CVE-2024-47575 4 - CVE-2024-43451 5 - CVE-2024-5690 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
17 Nov 2024
185 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Fortinet CVE-2024-23113 - actively exploited by state-sponsored hackers - is now being exploited by cybercriminals who have reverse-engineered it and are selling access to compromised devices If you haven't patched, restrict port 541 to approved IPs or enforce cert auth. http
@mattjay
14 Nov 2024
75253 Impressions
161 Retweets
921 Likes
309 Bookmarks
16 Replies
11 Quotes
Over 87,000 FortiOS devices are vulnerable. CVE-2024-23113, with a CVSS score of 9.8. Devices are at risk of Remote Code Execution (RCE). Among the affected products are: FortiOS 7.0+ FortiPAM 1.0+ FortiProxy 7.0+ FortiWeb 7.4+
@ishowcybersec
11 Nov 2024
128 Impressions
1 Retweet
3 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
10 Nov 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
8 Nov 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨A severe vulnerability (CVE-2024-23113): Over 87,000 FortiOS devices are at risk of #RCE attacks, exposing FortiOS, FortiProxy, FortiPAM, and FortiWeb products to unauthenticated #Remote Threats. 👉 Book a #Demo today at https://t.co/lGRc2vih4Q https://t.co/FB3gcSKRpG
@Akitra_Inc
8 Nov 2024
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
5 Nov 2024
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 #FortinetCVE #SSLVPN #FormatStringVulnerability #FortiGateSecurity #2024ApplianceVulnerability https://t.co/hKh7fKHczM
@reverseame
5 Nov 2024
1060 Impressions
7 Retweets
17 Likes
3 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
4 Nov 2024
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
30 Oct 2024
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
آژانس امنیت سایبری آمریکا اعلام کرده که یک آسیبپذیری بحرانی در محصولات Fortinet بنام CVE-2024-23113 درحال بهرهبرداریه که به مهاجم اجازه میده از راه دور کدهای دلخواه رو روی دستگاههای آسیبپذیر اجرا کنه. CISA به سازمانهای دولتی دستور داده تا طی سه هفته این مشکل رو برطرف کنند
@farajimahdi
30 Oct 2024
98 Impressions
0 Retweets
5 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 https://t.co/GfsDCgdXVF #Pentesting #CyberSecurity #Infosec https://t.co/G1oamUcSOW
@ptracesecurity
30 Oct 2024
1560 Impressions
9 Retweets
20 Likes
7 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
29 Oct 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
25 Oct 2024
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
command injection CVE-2024-23113 in Fortinet ForitGate firewalls you think we already solved application security in 2024? think again https://t.co/hreEAkRqzj
@liran_tal
23 Oct 2024
1086 Impressions
3 Retweets
15 Likes
1 Bookmark
0 Replies
1 Quote
CVE-2024-9379 is getting exploited #inthewild. Find out more at https://t.co/EWW68rStdS CVE-2024-23113 is getting exploited #inthewild. Find out more at https://t.co/OBk251qZL6 CVE-2024-9680 is getting exploited #inthewild. Find out more at https://t.co/T2MRAPfaEw
@inthewildio
23 Oct 2024
52 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-23113
@transilienceai
23 Oct 2024
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
【セキュリティ ニュース】悪用済み脆弱性「CVE-2024-23113」の対象製品を追加 - Fortinet:Security NEXT https://t.co/4jx4RXCeJg
@Syynya
22 Oct 2024
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【セキュリティ ニュース】悪用済み脆弱性「CVE-2024-23113」の対象製品を追加 - Fortinet(1ページ目 / 全1ページ):Security NEXT https://t.co/hxbDXELjyr #脆弱性
@nxf_owl
21 Oct 2024
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
悪用済み脆弱性「CVE-2024-23113」の対象製品を追加 - Fortinet #SecurityNext (Oct 21) https://t.co/sggdBAPWq1
@foxbook
21 Oct 2024
268 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Urgent Cybersecurity Alert: CVE-2024-23113 Vulnerability Threatens Fortinet Devices Understanding CVE-2024-23113: A Critical Vulnerability in Fortinet Devices In an ever-evolving cybersecurity landscape, vulnerabilities like CVE-2024-23113 are flashes… https://t.co/E4wdSIKyL9
@7SwanSwimming
21 Oct 2024
54 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
悪用済み脆弱性「CVE-2024-23113」の対象製品を追加 - Fortinet(1ページ目 / 全1ページ):Security NEXT https://t.co/lN6cxYeUqW
@ntsuji
21 Oct 2024
2331 Impressions
3 Retweets
7 Likes
2 Bookmarks
1 Reply
0 Quotes
【セキュリティ ニュース】悪用済み脆弱性「CVE-2024-23113」の対象製品を追加 - Fortinet(1ページ目 / 全1ページ):Security NEXT https://t.co/ePGSCeIyjo
@fyi787
21 Oct 2024
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【SecurityNext】悪用済み脆弱性「CVE-2024-23113」の対象製品を追加 - Fortinet #cybersecurity #security #news https://t.co/gWUukwXcLl
@IT_security_bot
21 Oct 2024
83 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113) https://t.co/v3JzdLAwh9
@Cyberdailybrief
20 Oct 2024
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
https://t.co/uEIXzdcpWg CISA warns: Fortinet products with critical 9.8 security vulnerability The critical security vulnerability CVE-2024-23113 in various versions of FortiOS, FortiPAM, FortiProxy and FortiWeb has been known since February, but according to CISA it is curr…
@B2bCyber
20 Oct 2024
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA warnt: Fortinet-Produkte mit kritischer 9.8 Sicherheitslücke Die kritische Sicherheitslücke CVE-2024-23113 in diversen Versionen von FortiOS, FortiPAM, FortiProxy und FortiWeb ist zwar seit Februar bekannt, wird wohl aber laut der https://t.co/HRSNiZEasE https://t.co/DJnA
@B2bCyber
20 Oct 2024
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
What year is it, tf? CVE-2024-23113 https://t.co/c7aSzEh7wi
@WoofyRyn
106 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-23113 - “let me tell you about this class of vulnerabilities which will never die..” https://t.co/T4T6TcCfKu
@alexjplaskett
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-23113 - “let me tell you about this class of vulnerability which will never die..” https://t.co/jDSUzgx0se
@alexjplaskett
1699 Impressions
2 Retweets
23 Likes
1 Bookmark
0 Replies
0 Quotes
Blog: Vulnerabilidades nas Soluções Fortinet: Um Alerta para Administradores https://t.co/8973UT8WjY #CVE-2024-23113 #CVE202423113 #Fortinet
@brainworkblog
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
(Otra) vulnerabilidad crítica en FortiOS explotada in-the-wild (RCE CVE-2024-23113) https://t.co/etDsAmKuJV
@SeguInfo
948 Impressions
5 Retweets
9 Likes
4 Bookmarks
0 Replies
0 Quotes
CVE-2024-23113 🤦 https://t.co/gj7t5BaRWY
@ajxchapman
95823 Impressions
183 Retweets
1860 Likes
181 Bookmarks
20 Replies
7 Quotes
87,000+ Fortinet devices still open to attack, are yours among them? (CVE-2024-23113) https://t.co/VtpCi8GZCA #HelpNetSecurity #Cybersecurity https://t.co/oAXrJFtgpy
@PoseidonTPA
62 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🛡️🚨 ¡Miles de IPs en riesgo por falla crítica en Fortinet! Una vulnerabilidad grave en Fortinet, conocida como CVE-2024-23113, está afectando a unos 87,000 IPs a nivel mundial. Esta falla permite la ejecución remota de código (RCE), lo que significa que los atacantes pueden…
@BugHunterMX
144 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
The CVE-2024-23113 has a CVSS 3.1 severity rating of 9.8 (critical). This vulnerability affects FortiOS, FortiProxy, FortiSwitchManager, and FortiPAM. If this is something you or your company uses, we recommend taking action to mitigate this threat as soon as possible. https://t.
@TotalAssure
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
87,000+ #Fortinet #devices still open to attack, are yours among them? (#CVE-2024-23113) https://t.co/xXjew4AzOb
@ScyScan
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-23113 is a fu%xking format string vulnerability, exploited in the wild in the year 2024 Thanks Fortinet
@Laughing_Mantis
18141 Impressions
20 Retweets
278 Likes
32 Bookmarks
4 Replies
4 Quotes
🚨 Critical FortiOS Security Flaw Exposes Thousands of Devices! Over 87,000 FortiOS devices are at risk of remote code execution (RCE), posing a global cybersecurity threat. Fortinet has identified CVE-2024-23113, a vulnerability affecting multiple versions of FortiOS,… https://t
@darkeye_team
194 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 https://t.co/vCooUHgJu6 #appsec
@eyalestrin
66 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Aktivně zneužívaná kritická zranitelnost ve FortiOS Již v únoru jsme vás informovali o kritické zranitelnosti ve Fortinet FortiOS CVE-2024-23113. Nyní je tato zranitelnost aktivně zneužívána. 📌 Pokud jste tak ještě neučinili, aktualizujte co nejdříve https://t.co/W0jHhWfUj8
@GOVCERT_CZ
1175 Impressions
4 Retweets
6 Likes
0 Bookmarks
1 Reply
0 Quotes
برای Fortigate SSLVPN آسیب پذیری با کد شناسایی CVE-2024-23113 منتشر شده است . این آسیب پذیری از نوع remote code execution و Format string می باشد که نسخه های 7.0 و 7.2 و 7.4 دارای این آسیب پذیری می باشند. https://t.co/Y2P1U3eX7Y https://t.co/8GW441gvSG
@AmirHossein_sec
41 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-23113 is a critical vulnerability in Fortinet products (FortiOS, FortiProxy, FortiPAM, FortiSwitchManager), allowing attackers to execute unauthorized commands via crafted packets. Get full details and insight from Intruder's security team 👉 https://t.co/t85bCbe0KU
@intruder_io
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "94C6FBEA-B8B8-4A92-9CAF-F4A125577C3C",
"versionEndIncluding": "7.0.14",
"versionStartIncluding": "7.0.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "406F8C48-85CE-46AF-BE5C-0ED9E3E16A39",
"versionEndIncluding": "7.2.8",
"versionStartIncluding": "7.2.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A8DD8789-6485-49E6-92D3-74004D9B6E9B",
"versionEndIncluding": "7.4.2",
"versionStartIncluding": "7.4.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CF2B9FD3-9581-465E-A5E1-A1BCEFB0DFA3",
"versionEndIncluding": "7.0.3",
"versionStartIncluding": "7.0.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "094185B2-8DC1-46C2-B160-31BEEFDB2CC7",
"versionEndIncluding": "7.2.3",
"versionStartIncluding": "7.2.0"
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DF27CA2F-3F4C-4CCB-B832-0E792673C429",
"versionEndIncluding": "7.0.13",
"versionStartIncluding": "7.0.0"
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "24D09A92-81EC-4003-B017-C67FC739EEBF",
"versionEndIncluding": "7.2.6",
"versionStartIncluding": "7.2.0"
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "49C323D0-5B01-4DB2-AB98-7113D8E607B6",
"versionEndIncluding": "7.4.2",
"versionStartIncluding": "7.4.0"
},
{
"criteria": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3BA2C6ED-2765-4B56-9B37-10C50BD32C75",
"versionEndIncluding": "1.0.3",
"versionStartIncluding": "1.0.0"
},
{
"criteria": "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D0060F1F-527F-4E91-A59F-F3141977CB7A",
"versionEndIncluding": "1.1.2",
"versionStartIncluding": "1.1.0"
},
{
"criteria": "cpe:2.3:o:fortinet:fortipam:1.2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6D0927D1-F469-4344-B4C9-3190645F5899"
}
],
"operator": "OR"
}
]
}
]