Heap buffer overflow in websocket

Summary

An heap-based buffer overflow vulnerability [CWE-122] in FortiOS, FortiProxy, FortiPAM, FortiSRA and FortiSwitchManager nodejs daemon may allow an authenticated attacker to execute arbitrary code or commands via specifically crafted requests.

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.2 Upgrade to 7.6.3 or above
FortiOS 7.4 7.4.0 through 7.4.6 Upgrade to 7.4.7 or above
FortiOS 7.2 7.2.0 through 7.2.10 Upgrade to 7.2.11 or above
FortiOS 7.0 7.0.2 through 7.0.16 Upgrade to 7.0.17 or above
FortiOS 6.4 Not affected Not Applicable
FortiPAM 1.7 Not affected Not Applicable
FortiPAM 1.6 Not affected Not Applicable
FortiPAM 1.5 1.5.0 Upgrade to 1.5.1 or above
FortiPAM 1.4 1.4.0 through 1.4.2 Upgrade to 1.4.3 or above
FortiPAM 1.3 1.3 all versions Migrate to a fixed release
FortiPAM 1.2 1.2 all versions Migrate to a fixed release
FortiPAM 1.1 1.1 all versions Migrate to a fixed release
FortiPAM 1.0 1.0 all versions Migrate to a fixed release
FortiProxy 7.6 7.6.0 through 7.6.1 Upgrade to 7.6.2 or above
FortiProxy 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiProxy 7.2 Not affected Not Applicable
FortiProxy 7.0 Not affected Not Applicable
FortiSRA 1.7 Not affected Not Applicable
FortiSRA 1.6 Not affected Not Applicable
FortiSRA 1.5 1.5.0 Upgrade to 1.5.1 or above
FortiSRA 1.4 1.4.0 through 1.4.2 Upgrade to 1.4.3 or above
FortiSwitchManager 7.2 7.2.1 through 7.2.5 Upgrade to 7.2.6 or above
FortiSwitchManager 7.0 Not affected Not Applicable
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Virtual Patch named "FG-VD-58637.0day." is available in FMWP db update 25.081

Acknowledgement

Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security team.

Timeline

2025-10-14: Initial publication