Loading HuntDB...

fortianalyzer

59 Versions 45 CVEs

Versions

6.2.0

SEMANTIC 23 CVEs

6.4.12

SEMANTIC 3 CVEs

7.0.8

SEMANTIC 4 CVEs

6.4.13

SEMANTIC 4 CVEs

6.4.11

SEMANTIC 3 CVEs

6.0.10

SEMANTIC 1 CVE

FortiManager 7.0.0, 6.4.6; FortiAnalyzer 7.0.0, 6.4.6

OTHER 1 CVE

6.4.9

SEMANTIC 1 CVE

5.6.10

SEMANTIC 1 CVE

7.2.4

SEMANTIC 3 CVEs

7.2.0

SEMANTIC 34 CVEs

7.4.2

SEMANTIC 8 CVEs

6.4.15

SEMANTIC 9 CVEs

7.0.12

SEMANTIC 3 CVEs

FortiManager 6.2.0, 6.2.1, 6.2.2, and 6.2.3 ; FortiAnalyzer 6.2.0, 6.2.1, 6.2.2, and 6.2.3

OTHER 1 CVE

FortiAnalyzer 5.6.0 and below

OTHER 1 CVE

6.4.8

SEMANTIC 5 CVEs

6.2.12

SEMANTIC 8 CVEs

7.0.4

SEMANTIC 2 CVEs

5.6.0

SEMANTIC 3 CVEs

6.2.9

SEMANTIC 2 CVEs

7.0.10

SEMANTIC 2 CVEs

7.0.13

SEMANTIC 9 CVEs

6.4.7

SEMANTIC 2 CVEs

7.2.1

SEMANTIC 7 CVEs

7.0.7

SEMANTIC 2 CVEs

7.2.8

SEMANTIC 1 CVE

7.4.0

SEMANTIC 27 CVEs

6.2.13

SEMANTIC 8 CVEs

7.4.1

SEMANTIC 4 CVEs

7.2.2

SEMANTIC 3 CVEs

7.0.5

SEMANTIC 3 CVEs

7.0.0

SEMANTIC 35 CVEs

7.0.2

SEMANTIC 4 CVEs

5.4.7

SEMANTIC 1 CVE

7.2.5

SEMANTIC 10 CVEs

5.4.0

SEMANTIC 1 CVE

7.0.9

SEMANTIC 4 CVEs

6.0.4

SEMANTIC 1 CVE

7.2.3

SEMANTIC 11 CVEs

7.0.11

SEMANTIC 2 CVEs

5.2.10

SEMANTIC 1 CVE

6.2.10

SEMANTIC 1 CVE

6.2.11

SEMANTIC 5 CVEs

7.0.3

SEMANTIC 1 CVE

6.4.14

SEMANTIC 5 CVEs

7.4.3

SEMANTIC 6 CVEs

5.6.11

SEMANTIC 2 CVEs

5.2.4

SEMANTIC 1 CVE

6.4.10

SEMANTIC 4 CVEs

FortiManager 6.0.0, 5.6.4 and below versions; FortiAnalyzer 6.0.0, 5.6.4 and below versions

OTHER 1 CVE

6.0.0

SEMANTIC 9 CVEs

6.0.12

SEMANTIC 5 CVEs

6.4.0

SEMANTIC 32 CVEs

6.2.7

SEMANTIC 1 CVE

6.0.11

SEMANTIC 2 CVEs

7.0.6

SEMANTIC 2 CVEs

6.4.5

SEMANTIC 1 CVE

5.3.11

SEMANTIC 1 CVE

Recent CVEs

CVE-2021-32589

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

HIGH Dec 19, 2024

CVE-2023-25607

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC  7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function.

HIGH Oct 10, 2023

CVE-2022-22305

An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers.

MEDIUM Sep 01, 2023

CVE-2021-43072

A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiAnalyzer version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiManager version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiOS version 7.0.0 through 7.0.4, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x and FortiProxy version 7.0.0 through 7.0.3, 2.0.0 through 2.0.8, 1.2.x, 1.1.x and 1.0.x allows attacker to execute unauthorized code or commands via crafted CLI `execute restore image` and `execute certificate remote` operations with the tFTP protocol.

MEDIUM Jul 18, 2023

CVE-2023-25606

An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-23] in FortiAnalyzer and FortiManager management interface 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4  all versions may allow a remote and authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.

MEDIUM Jul 11, 2023

CVE-2023-25609

A server-side request forgery (SSRF) vulnerability [CWE-918] in FortiManager and FortiAnalyzer GUI 7.2.0 through 7.2.1, 7.0.0 through 7.0.6, 6.4.8 through 6.4.11 may allow a remote and authenticated attacker to access unauthorized files and services on the system via specially crafted web requests.

MEDIUM Jun 13, 2023

CVE-2022-42477

An improper input validation vulnerability [CWE-20] in FortiAnalyzer version 7.2.1 and below, version 7.0.6 and below, 6.4 all versions may allow an authenticated attacker to disclose file system information via custom dataset SQL queries.

MEDIUM Apr 11, 2023

CVE-2023-25611

A improper neutralization of formula elements in a CSV file vulnerability in Fortinet FortiAnalyzer 6.4.0 - 6.4.9, 7.0.0 - 7.0.5, and 7.2.0 - 7.2.1 allows local attacker to execute unauthorized code or commands via inserting spreadsheet formulas in macro names.

MEDIUM Mar 07, 2023

CVE-2022-30304

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiAnalyzer versions prior to 7.2.1, 7.0.4 and 6.4.8 may allow a remote unauthenticated attacker to perform a stored cross site scripting (XSS) attack via the URL parameter observed in the FortiWeb attack event logview in FortiAnalyzer.

MEDIUM Feb 16, 2023

CVE-2022-38377

An improper access control vulnerability [CWE-284] in FortiManager 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11 and FortiAnalyzer 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.0 through 6.0.12 may allow a remote and authenticated admin user assigned to a specific ADOM to access other ADOMs information such as device information and dashboard information.

MEDIUM Nov 25, 2022