CVE-2024-32123

Multiple improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2 7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 and 5.6.0 through 5.6.11 and 5.4.0 through 5.4.7 and 5.2.0 through 5.2.10 and 5.0.0 through 5.0.12 and 4.3.4 through 4.3.8 allows attacker to execute unauthorized code or commands via crafted CLI requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-24-124 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-11 15:15

Updated : 2025-07-24 19:05


NVD link : CVE-2024-32123

Mitre link : CVE-2024-32123

CVE.ORG link : CVE-2024-32123


JSON object : View

Products Affected

fortinet

  • fortianalyzer
  • fortimanager
  • fortianalyzer_big_data
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')