Format string vulnerability in fazsvcd
Summary
A use of externally-controlled format string vulnerability [CWE-134] in FortiAnalyzer, FortiAnalyzer Cloud, FortiManager and FortiManager Cloud fazsvcd daemon may allow a remote privileged attacker with admin profile to execute arbitrary code or commands via specially crafted requests.
| Version | Affected | Solution |
|---|---|---|
| FortiAnalyzer 7.6 | 7.6.0 through 7.6.4 | Upgrade to 7.6.5 or above |
| FortiAnalyzer 7.4 | 7.4.0 through 7.4.7 | Upgrade to 7.4.8 or above |
| FortiAnalyzer 7.2 | 7.2 all versions | Migrate to a fixed release |
| FortiAnalyzer 7.0 | 7.0 all versions | Migrate to a fixed release |
| FortiAnalyzer Cloud 7.6 | 7.6.0 through 7.6.4 | Upgrade to 7.6.5 or above |
| FortiAnalyzer Cloud 7.4 | 7.4.0 through 7.4.7 | Upgrade to 7.4.8 or above |
| FortiAnalyzer Cloud 7.2 | 7.2 all versions | Migrate to a fixed release |
| FortiAnalyzer Cloud 7.0 | 7.0 all versions | Migrate to a fixed release |
| FortiManager 7.6 | 7.6.0 through 7.6.4 | Upgrade to 7.6.5 or above |
| FortiManager 7.4 | 7.4.0 through 7.4.7 | Upgrade to 7.4.8 or above |
| FortiManager 7.2 | 7.2 all versions | Migrate to a fixed release |
| FortiManager 7.0 | 7.0 all versions | Migrate to a fixed release |
| FortiManager Cloud 7.6 | 7.6.0 through 7.6.4 | Upgrade to 7.6.5 or above |
| FortiManager Cloud 7.4 | 7.4.0 through 7.4.7 | Upgrade to 7.4.8 or above |
| FortiManager Cloud 7.2 | 7.2 all versions | Migrate to a fixed release |
| FortiManager Cloud 7.0 | 7.0 all versions | Migrate to a fixed release |