Vulnerabilities > Fortinet > High

DATE CVE VULNERABILITY TITLE RISK
2025-01-14 CVE-2024-46668 Allocation of Resources Without Limits or Throttling vulnerability in Fortinet Fortios
An allocation of resources without limits or throttling vulnerability [CWE-770] in FortiOS versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, versions 7.0.0 through 7.0.15, and versions 6.4.0 through 6.4.15 may allow an unauthenticated remote user to consume all system memory via multiple large file uploads.
network
low complexity
fortinet CWE-770
7.5
2025-01-14 CVE-2024-46670 Out-of-bounds Read vulnerability in Fortinet Fortios
An Out-of-bounds Read vulnerability [CWE-125] in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of Service via crafted requests.
network
low complexity
fortinet CWE-125
7.5
2025-01-14 CVE-2024-48890 OS Command Injection vulnerability in Fortinet Fortisoar Imap Connector 3.5.6/3.5.7
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSOAR IMAP connector version 3.5.7 and below may allow an authenticated attacker to execute unauthorized code or commands via a specifically crafted playbook
network
low complexity
fortinet CWE-78
8.8
2025-01-14 CVE-2024-50566 OS Command Injection vulnerability in Fortinet Fortimanager and Fortimanager Cloud
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager versions 7.6.0 through 7.6.1, versions 7.4.5 through 7.4.0, and versions 7.2.1 through 7.2.8, FortiManager Cloud versions 7.6.0 through 7.6.1, versions 7.4.0 through 7.4.4, and versions 7.2.2 through 7.2.7 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.
network
low complexity
fortinet CWE-78
8.8
2024-12-19 CVE-2020-12820 Out-of-bounds Write vulnerability in Fortinet Fortios
Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name.
network
low complexity
fortinet CWE-787
8.8
2024-12-19 CVE-2020-15934 Improper Privilege Management vulnerability in Fortinet Forticlient
An execution with unnecessary privileges vulnerability in the VCM engine of FortiClient for Linux versions 6.2.7 and below, version 6.4.0.
local
low complexity
fortinet CWE-269
7.8
2024-12-19 CVE-2021-26115 OS Command Injection vulnerability in Fortinet Fortiwan
An OS command injection (CWE-78) vulnerability in FortiWAN version 4.5.7 and below Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.An OS command injection (CWE-78) vulnerability in FortiWAN Command Line Interface may allow a local, authenticated and unprivileged attacker to escalate their privileges to root via executing a specially-crafted command.
local
low complexity
fortinet CWE-78
7.8
2024-12-19 CVE-2020-12819 Out-of-bounds Write vulnerability in Fortinet Fortios
A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled.
network
high complexity
fortinet CWE-787
7.5
2024-11-13 CVE-2024-47574 Missing Authentication for Critical Function vulnerability in Fortinet Forticlient
A authentication bypass using an alternate path or channel in Fortinet FortiClientWindows version 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0 allows low privilege attacker to execute arbitrary code with high privilege via spoofed named pipe messages.
local
low complexity
fortinet CWE-306
7.8
2024-11-12 CVE-2023-47543 Authorization Bypass Through User-Controlled Key vulnerability in Fortinet Fortiportal
An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to interact with ressources of other organizations via HTTP or HTTPS requests.
network
low complexity
fortinet CWE-639
8.1