Format string vulnerability in command line interpreter
Summary
A format string vulnerability [CWE-134] in the command line interpreter of FortiOS, FortiOS-6K7K, FortiProxy, FortiADC, and FortiMail may allow an authenticated user to execute unauthorized code or commands via specially crafted command arguments.
Affected Products
FortiADC version 6.0.0 through 6.0.4
FortiADC version 6.1.0 through 6.1.5
FortiADC version 6.2.0 through 6.2.1
FortiProxy version 1.0.0 through 1.0.7
FortiProxy version 1.1.0 through 1.1.6
FortiProxy version 1.2.0 through 1.2.13
FortiProxy version 2.0.0 through 2.0.7
FortiProxy version 7.0.0 through 7.0.1
FortiOS version 5.0.0 through 5.0.14
FortiOS version 5.2.0 through 5.2.15
FortiOS version 5.4.0 through 5.4.13
FortiOS version 5.6.0 through 5.6.14
FortiOS version 6.0.0 through 6.0.14
FortiOS version 6.2.0 through 6.2.10
FortiOS version 6.4.0 through 6.4.8
FortiOS version 7.0.0 through 7.0.2
FortiOS-6K7K version 6.0.10
FortiOS-6K7K version 6.0.12 through 6.0.16
FortiOS-6K7K version 6.2.4
FortiOS-6K7K version 6.2.6 through 6.2.7
FortiOS-6K7K version 6.2.9 through 6.2.13
FortiOS-6K7K version 6.4.2
FortiOS-6K7K version 6.4.6
FortiMail version 6.4.0 through 6.4.5
FortiMail version 7.0.0 through 7.0.2
Solutions
Upgrade to FortiOS 7.0.4 or above.
Upgrade to FortiOS 6.4.9 or above.
Upgrade to FortiOS 6.2.11 or above.
Upgrade to FortiOS 6.0.15 or above.
Please upgrade to FortiOS-6K7K version 6.4.8 or above.
Upgrade to FortiProxy 7.0.2 or above
Upgrade to FortiProxy 2.0.8 or above
Fixes for Fortiproxy 1.2, 1.1 and 1.0 are not planned
Upgrade to FortiADC 7.0.1 or above
Upgrade to FortiADC 6.2.3 or above
Upgrade to FortiMail 6.4.6 or above.
Upgrade to FortiMail 7.0.3 or above.
Upgrade to FortiMail 7.2.0 or above.
Acknowledgement
Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security Team.Timeline
2022-08-02: Initial publication