A use of externally-controlled format string vulnerability [CWE-134] vulnerability in Fortinet allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
References
History

Wed, 14 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 14:00:00 +0000

Type Values Removed Values Added
Description A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments. A use of externally-controlled format string vulnerability [CWE-134] vulnerability in Fortinet allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
First Time appeared Fortinet fortianalyzer-bigdata
CPEs cpe:2.3:a:fortinet:fortianalyzer-bigdata:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:6.4.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:6.4.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:6.4.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer-bigdata:7.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:5.3.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.10:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.11:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.12:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.13:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.14:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiportal:6.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:6.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortianalyzer:7.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.2.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.10:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.11:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.12:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.13:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.14:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.15:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:6.4.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.5:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.6:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.7:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.8:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.0.9:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.2:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.2.3:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortimanager:7.4.1:*:*:*:*:*:*:*
Vendors & Products Fortinet fortianalyzer-bigdata

Fri, 11 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet fortianalyzer Big Data
CPEs cpe:2.3:a:fortinet:fortianalyzer_bigdata:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer_bigdata:6.2.5:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer_big_data:6.2.5:*:*:*:*:*:*:*
Vendors & Products Fortinet fortianalyzer Bigdata
Fortinet fortianalyzer Big Data

cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2024-03-12T15:09:16.279Z

Updated: 2026-01-14T13:46:06.714Z

Reserved: 2023-09-04T08:12:52.814Z

Link: CVE-2023-41842

cve-icon Vulnrichment

Updated: 2024-08-02T19:09:49.300Z

cve-icon NVD

Status : Modified

Published: 2024-03-12T15:15:45.920

Modified: 2026-01-14T14:16:08.650

Link: CVE-2023-41842

cve-icon Redhat

No data.