Multiple format string vulnerabilities

Summary

A use of externally-controlled format string vulnerability [CWE-134] in FortiOS, FortiProxy, FortiPAM, FortiSRA and FortiWeb may allow a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.

Version Affected Solution
FortiOS 7.6 Not affected Not Applicable
FortiOS 7.4 7.4.0 through 7.4.4 Upgrade to 7.4.5 or above
FortiOS 7.2 7.2.0 through 7.2.9 Upgrade to 7.2.10 or above
FortiOS 7.0 7.0.0 through 7.0.15 Upgrade to 7.0.16 or above
FortiOS 6.4 6.4.0 through 6.4.15 Upgrade to 6.4.16 or above
FortiOS 6.2 6.2.0 through 6.2.16 Upgrade to 6.2.17 or above
FortiPAM 1.5 Not affected Not Applicable
FortiPAM 1.4 1.4.0 through 1.4.2 Upgrade to 1.4.3 or above
FortiPAM 1.3 1.3.0 through 1.3.1 Upgrade to upcoming 1.3.2 or above
FortiPAM 1.2 1.2 all versions Migrate to a fixed release
FortiPAM 1.1 1.1 all versions Migrate to a fixed release
FortiPAM 1.0 1.0 all versions Migrate to a fixed release
FortiProxy 7.6 7.6.0 Upgrade to 7.6.1 or above
FortiProxy 7.4 7.4.0 through 7.4.6 Upgrade to 7.4.7 or above
FortiProxy 7.2 7.2.0 through 7.2.12 Upgrade to 7.2.13 or above
FortiProxy 7.0 7.0.0 through 7.0.19 Upgrade to 7.0.20 or above
FortiProxy 2.0 Not affected Not Applicable
FortiSRA 1.5 Not affected Not Applicable
FortiSRA 1.4 1.4.0 through 1.4.2 Upgrade to 1.4.3 or above
FortiWeb 7.6 7.6.0 Upgrade to 7.6.1 or above
FortiWeb 7.4 7.4.0 through 7.4.5 Upgrade to 7.4.6 or above
FortiWeb 7.2 7.2.0 through 7.2.10 Upgrade to 7.2.11 or above
FortiWeb 7.0 7.0.0 through 7.0.10 Upgrade to 7.0.11 or above
FortiWeb 6.4 Not affected Not Applicable
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Timeline

2025-03-11: Initial publication
2025-05-14: Add FortiOS 6.2.17 as solution