Fortinet Product Security Update Advisory
Overview
An update has been made available to fix vulnerabilities in the Fortinet family of products. Users of affected versions are advised to update to the latest version.
Affected Products
CVE-2024-23110
- FortiOS Versions: 7.4.0 (inclusive) to 7.4.2 (inclusive)
- FortiOS Versions : 7.2.0 (inclusive) to 7.2.6 (inclusive)
- FortiOS versions : 7.0.0 (inclusive) to 7.0.13 (inclusive)
- FortiOS versions : 6.4.0 (inclusive) to 6.4.14 (inclusive)
- FortiOS versions : 6.2.0 (inclusive) to 6.2.15 (inclusive)
- FortiOS version: all versions of 6.0
CVE-2024-26010
- FortiOS Versions: 7.4.0 (inclusive) through 7.4.3 (inclusive)
- FortiOS Versions: 7.2.0 (inclusive) through 7.2.7 (inclusive)
- FortiOS versions : 7.0.0 (inclusive) to 7.0.14 (inclusive)
- FortiOS versions: all versions of 6.4
- FortiOS version : all versions of 6.2
- FortiOS version: all versions of 6.0
- FortiPAM version: all versions of 1.2
- FortiPAM version: all versions of 1.1
- FortiPAM version: all versions of 1.0
- FortiProxy version: 7.4.0 (inclusive) to 7.4.3 (inclusive)
- FortiProxy versions: 7.2.0 (inclusive) to 7.2.9 (inclusive)
- FortiProxy version: all versions of 2.0
- FortiProxy versions: all versions of 1.2
- FortiProxy versions: all versions of 1.1
- FortiProxy version: all versions of 1.0
- FortiSwitchManager versions: 7.2.0 (inclusive) through 7.2.3 (inclusive)
- FortiSwitchManager versions: 7.0.1 (inclusive) to 7.0.3 (inclusive)
CVE-2024-23111
- FortiOS Versions: 7.4.0 (inclusive) to 7.4.3 (inclusive)
- FortiOS Versions: 7.2.0 (inclusive) to 7.2.7 (inclusive)
- FortiOS versions : 7.0.0 (inclusive) to 7.0.13 (inclusive)
- FortiOS version: all versions of 6.4
- FortiProxy versions: 7.4.0 (inclusive) to 7.4.2 (inclusive)
- FortiProxy versions: 7.2.0 (inclusive) to 7.2.8 (inclusive)
- FortiProxy versions : 7.0.0 (inclusive) to 7.0.14 (inclusive)
- FortiProxy version: all versions of 2.0
CVE-2023-46720
- FortiOS versions: 7.4.0 (inclusive) to 7.4.1 (inclusive)
- FortiOS versions: 7.2.0 (inclusive) through 7.2.7 (inclusive)
- FortiOS versions : 7.0.0 (inclusive) to 7.0.12 (inclusive)
- FortiOS versions : 6.4.6 (inclusive) to 6.4.15 (inclusive)
- FortiOS versions : 6.2.9 (inclusive) to 6.2.16 (inclusive)
- FortiOS versions: 6.0.13 (inclusive) to 6.0.18 (inclusive)
CVE-2024-21754
- FortiOS Versions: 7.4.0 (inclusive) to 7.4.3 (inclusive)
- FortiOS version: all versions of 7.2
- FortiOS Versions: all versions of 7.0
- FortiOS version: all versions of 6.4
- FortiProxy versions: 7.4.0 (inclusive) to 7.4.2 (inclusive)
- FortiProxy version: all versions of 7.2
- FortiProxy versions: all versions of 7.0
- FortiProxy versions: all versions of 2.0
Resolved Vulnerabilities
Multiple Buffer Overflow Vulnerability in the diag npu command in FortiOS (CVE-2024-23110) [1][2]
Stack Buffer Overflow Vulnerability in FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager (CVE-2024-26010) [3][4]
XSS Vulnerability in FortiOS and FortiProxy (CVE-2024-23111) [5][6]
Stack Buffer Overflow Vulnerability in FortiOS (CVE-2023-46720) [7][8]
Improper access control vulnerability in FortiOS and FortiProxy that could allow backup files to be decrypted due to insufficient hashed passwords (CVE-2024-21754) [9][10]
Vulnerability Patches
Vulnerability patches have been made available in the latest updates. Please follow the instructions on the referenced sites to update to the latest vulnerability patched version.
CVE-2024-23110
- FortiOS versions: 7.4.x versions, at least 7.4.3
- FortiOS version: 7.2.x versions, at least 7.2.7
- FortiOS version: 7.0.x versions, at least 7.0.14
- FortiOS version: 6.4.x versions, at least 6.4.15
- FortiOS version: 6.2.x versions, at least 6.2.16
CVE-2024-26010
- FortiOS version: 7.4.x versions, at least 7.4.4
- FortiOS version: 7.2.x versions, at least 7.2.8
- FortiOS version: 7.0.x versions, at least 7.0.15
- FortiPAM version: version 1.3
- FortiProxy version: 7.4.x versions, at least 7.4.4
- FortiProxy version: 7.2.x version at least 7.2.10
- FortiProxy version: 7.0.x versions, at least 7.0.17
- FortiSwitchManager version: 7.2.x versions, at least 7.2.4
- FortiSwitchManager version: 7.0.x versions, at least 7.0.4
CVE-2024-23111
- FortiOS version: 7.4.x versions, at least 7.4.4
- FortiOS version: 7.2.x versions, at least 7.2.8
- FortiOS version: 7.0.x versions, at least 7.0.14
- FortiProxy version: 7.4.x versions, at least 7.4.3
- FortiProxy version: 7.2.x versions, at least 7.2.9
- FortiProxy version: 7.0.x versions, at least 7.0.15
CVE-2023-46720
- FortiOS version: 7.4.x versions, at least 7.4.4
- FortiOS version: 7.2.x versions, at least 7.2.8
CVE-2024-21754
- FortiOS version: 7.4.x versions, at least 7.4.4
- FortiProxy version: 7.4.x versions, at least 7.4.3
Referenced Sites
[1] Multiple buffer overflows in diag npu command
https://www.fortiguard.com/psirt/FG-IR-23-460
[2] CVE-2024-23110 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-23110
[3] Buffer overflow in fgfmd
https://fortiguard.fortinet.com/psirt/FG-IR-24-036
[4] CVE-2024-26010 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-26010
[5] FortiOS/FortiProxy – XSS in reboot page
https://fortiguard.fortinet.com/psirt/FG-IR-23-471
[6] CVE-2024-23111 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-23111
[7] Stack buffer overflow on bluetooth write feature
https://fortiguard.fortinet.com/psirt/FG-IR-23-356
[8] CVE-2023-46720 Detail
https://nvd.nist.gov/vuln/detail/CVE-2023-46720
[9] Weak key derivation for backup file
https://fortiguard.fortinet.com/psirt/FG-IR-23-423
[10] CVE-2024-21754 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-21754
[11] Upgrade Path Tool Table
https://docs.fortinet.com/upgrade-tool/fortigate