Format String Bug in fazsvcd
Summary
A use of externally-controlled format string vulnerability [CWE-134] in FortiAnalyzer fazsvcd daemon may allow a remote privileged attacker with admin profile to execute arbitrary code or commands via specially crafted requests.
| Version | Affected | Solution |
|---|---|---|
| FortiAnalyzer 7.6 | Not affected | Not Applicable |
| FortiAnalyzer 7.4 | 7.4.0 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiAnalyzer 7.2 | 7.2.2 through 7.2.5 | Upgrade to 7.2.6 or above |
| FortiAnalyzer 7.0 | Not affected | Not Applicable |
| FortiAnalyzer 6.4 | Not affected | Not Applicable |
| FortiAnalyzer Cloud 7.4 | 7.4.1 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiAnalyzer Cloud 7.2 | 7.2.2 through 7.2.6 | Upgrade to 7.2.7 or above |