Format String Bug in fazsvcd

Summary

A use of externally-controlled format string vulnerability [CWE-134] in FortiAnalyzer fazsvcd daemon may allow a remote privileged attacker with admin profile to execute arbitrary code or commands via specially crafted requests.

Version Affected Solution
FortiAnalyzer 7.6 Not affected Not Applicable
FortiAnalyzer 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiAnalyzer 7.2 7.2.2 through 7.2.5 Upgrade to 7.2.6 or above
FortiAnalyzer 7.0 Not affected Not Applicable
FortiAnalyzer 6.4 Not affected Not Applicable
FortiAnalyzer Cloud 7.4 7.4.1 through 7.4.3 Upgrade to 7.4.4 or above
FortiAnalyzer Cloud 7.2 7.2.2 through 7.2.6 Upgrade to 7.2.7 or above

Acknowledgement

Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security Team.

Timeline

2024-10-08: Initial publication