Loading HuntDB...

fortimanager

67 Versions 52 CVEs

Versions

6.4

MAJOR_MINOR 1 CVE

6.2

MAJOR_MINOR 1 CVE

6.2.0

SEMANTIC 26 CVEs

6.4.12

SEMANTIC 4 CVEs

7.0.8

SEMANTIC 5 CVEs

6.4.13

SEMANTIC 3 CVEs

6.4.11

SEMANTIC 4 CVEs

6.0.10

SEMANTIC 1 CVE

5.6.10

SEMANTIC 1 CVE

7.2.4

SEMANTIC 5 CVEs

7.6.1

SEMANTIC 2 CVEs

7.2.0

SEMANTIC 39 CVEs

5.0.0

SEMANTIC 1 CVE

7.4.2

SEMANTIC 15 CVEs

6.4.15

SEMANTIC 10 CVEs

7.0.12

SEMANTIC 7 CVEs

5.2.0

SEMANTIC 1 CVE

6.4.8

SEMANTIC 3 CVEs

6.2.12

SEMANTIC 10 CVEs

5.6.0

SEMANTIC 3 CVEs

6.2.9

SEMANTIC 1 CVE

7.0.10

SEMANTIC 4 CVEs

7.0.13

SEMANTIC 11 CVEs

7.4.4

SEMANTIC 2 CVEs

FortiManager 5.6.0 and below

OTHER 1 CVE

6.4.7

SEMANTIC 2 CVEs

7.0.7

SEMANTIC 4 CVEs

7.2.8

SEMANTIC 2 CVEs

7.2.1

SEMANTIC 4 CVEs

7.4.0

SEMANTIC 37 CVEs

6.2.13

SEMANTIC 9 CVEs

7.2.2

SEMANTIC 3 CVEs

7.4.1

SEMANTIC 6 CVEs

7.0.5

SEMANTIC 3 CVEs

7.0.0

SEMANTIC 42 CVEs

7.0.1

SEMANTIC 2 CVEs

7.0.2

SEMANTIC 2 CVEs

5.4.7

SEMANTIC 1 CVE

7.2.5

SEMANTIC 14 CVEs

5.0.6 to 5.2.7

OTHER 1 CVE

5.4.0

SEMANTIC 1 CVE

7.0.9

SEMANTIC 4 CVEs

6.0.4

SEMANTIC 1 CVE

7.0.11

SEMANTIC 3 CVEs

7.2.3

SEMANTIC 13 CVEs

5.0.12

SEMANTIC 1 CVE

5.4.0 to 5.4.1

OTHER 1 CVE

7.4.5

SEMANTIC 1 CVE

5.2.10

SEMANTIC 1 CVE

6.2.10

SEMANTIC 1 CVE

6.2.11

SEMANTIC 5 CVEs

7.0.3

SEMANTIC 1 CVE

6.4.14

SEMANTIC 9 CVEs

7.4.3

SEMANTIC 4 CVEs

5.6.11

SEMANTIC 2 CVEs

6.4.10

SEMANTIC 3 CVEs

6.0.0

SEMANTIC 9 CVEs

6.4.6

SEMANTIC 1 CVE

6.0.12

SEMANTIC 6 CVEs

6.4.0

SEMANTIC 34 CVEs

6.2.7

SEMANTIC 1 CVE

6.0.11

SEMANTIC 1 CVE

7.0.6

SEMANTIC 1 CVE

6.4.5

SEMANTIC 1 CVE

7.2.7

SEMANTIC 2 CVEs

6.2.8

SEMANTIC 1 CVE

7.6.0

SEMANTIC 4 CVEs

Recent CVEs

CVE-2021-32589

A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

HIGH Dec 19, 2024

CVE-2023-47542

A improper neutralization of special elements used in a template engine [CWE-1336] in FortiManager versions 7.4.1 and below, versions 7.2.4 and below, and 7.0.10 and below allows attacker to execute unauthorized code or commands via specially crafted templates.

MEDIUM Apr 09, 2024

CVE-2023-41679

An improper access control vulnerability [CWE-284] in FortiManager management interface 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions may allow a remote and authenticated attacker with at least "device management" permission on his profile and belonging to a specific ADOM to add and delete CLI script on other ADOMs

HIGH Oct 10, 2023

CVE-2023-25607

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC  7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function.

HIGH Oct 10, 2023

CVE-2022-22305

An improper certificate validation vulnerability [CWE-295] in FortiManager 7.0.1 and below, 6.4.6 and below; FortiAnalyzer 7.0.2 and below, 6.4.7 and below; FortiOS 6.2.x and 6.0.x; FortiSandbox 4.0.x, 3.2.x and 3.1.x may allow a network adjacent and unauthenticated attacker to man-in-the-middle the communication between the listed products and some external peers.

MEDIUM Sep 01, 2023

CVE-2021-43072

A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiAnalyzer version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiManager version 7.0.2 and below, version 6.4.7 and below, version 6.2.9 and below, version 6.0.11 and below, version 5.6.11 and below, FortiOS version 7.0.0 through 7.0.4, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.x and FortiProxy version 7.0.0 through 7.0.3, 2.0.0 through 2.0.8, 1.2.x, 1.1.x and 1.0.x allows attacker to execute unauthorized code or commands via crafted CLI `execute restore image` and `execute certificate remote` operations with the tFTP protocol.

MEDIUM Jul 18, 2023

CVE-2023-25606

An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-23] in FortiAnalyzer and FortiManager management interface 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4  all versions may allow a remote and authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.

MEDIUM Jul 11, 2023

CVE-2023-25609

A server-side request forgery (SSRF) vulnerability [CWE-918] in FortiManager and FortiAnalyzer GUI 7.2.0 through 7.2.1, 7.0.0 through 7.0.6, 6.4.8 through 6.4.11 may allow a remote and authenticated attacker to access unauthorized files and services on the system via specially crafted web requests.

MEDIUM Jun 13, 2023

CVE-2022-45857

An incorrect user management vulnerability [CWE-286] in the FortiManager version 6.4.6 and below VDOM creation component may allow an attacker to access a FortiGate without a password via newly created VDOMs after the super_admin account is deleted.

MEDIUM Jan 05, 2023

CVE-2022-38377

An improper access control vulnerability [CWE-284] in FortiManager 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11 and FortiAnalyzer 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.0 through 6.2.10, 6.0.0 through 6.0.12 may allow a remote and authenticated admin user assigned to a specific ADOM to access other ADOMs information such as device information and dashboard information.

MEDIUM Nov 25, 2022