Stack buffer overflow in CAPWAP daemon
Summary
A stack-based overflow vulnerability [CWE-124] in FortiOS CAPWAP daemon may allow a remote unauthenticated attacker on an adjacent network to achieve arbitrary code execution via sending specially crafted packets. Note that in the default configuration, the attacker must be in control of an authorized FortiAP for the attack to succeed and have access to the same local IP subnet. Additionally, successful exploitation would require defeating stack protection and ASLR.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.6 | 7.6.0 through 7.6.3 | Upgrade to 7.6.4 or above |
| FortiOS 7.4 | 7.4.0 through 7.4.8 | Upgrade to 7.4.9 or above |
| FortiOS 7.2 | 7.2 all versions | Migrate to a fixed release |
| FortiOS 7.0 | 7.0 all versions | Migrate to a fixed release |
| FortiOS 6.4 | 6.4 all versions | Migrate to a fixed release |
| FortiOS 6.2 | 6.2 all versions | Migrate to a fixed release |
| FortiOS 6.0 | 6.0 all versions | Migrate to a fixed release |
| FortiSASE 25.3 | 25.3.b | Fortinet remediated this issue in 25.3.c and hence customers do not need to perform any action. |
| FortiSASE 24.4 | Not affected | Not Applicable |
| FortiSASE 23.3 | Not affected | Not Applicable |
| FortiSASE 23.2 | Not affected | Not Applicable |
| FortiSASE 23.1 | Not affected | Not Applicable |
| FortiSASE 22.4 | Not affected | Not Applicable |
Workarounds :
Disable security fabric access into interface.
Only allow legit devices in Wifi Controller > Managed FortiAPs
Remove inter-controller-peer elements in config wireless-controller inter-controller configuration
Warning :
if auto-auth-extension-device is enabled in config system interface, any device
can be authorized and then the vulnerability can be exploited without administrator
authorization.
Please note that auto-auth-extension-device is disabled by default
Acknowledgement
Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security team.Timeline
2025-11-18: Initial publication2025-11-21: add workarounds