Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] vulnerability in Fortinet allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-076 |
|
History
Wed, 14 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] in Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests. | Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] vulnerability in Fortinet allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests. |
| First Time appeared |
Fortinet fortiadcmanager
|
|
| CPEs | cpe:2.3:h:fortinet:fortiadc:5.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.7:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.8:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.7:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.3.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.4.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.1.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:7.1.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet fortiadcmanager
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published: 2023-06-13T08:41:46.873Z
Updated: 2026-01-14T14:15:28.898Z
Reserved: 2023-02-20T15:09:20.637Z
Link: CVE-2023-26210
Updated: 2024-08-02T11:46:23.415Z
Status : Modified
Published: 2023-06-13T09:15:16.510
Modified: 2026-01-14T15:15:53.513
Link: CVE-2023-26210
No data.