Refine your search
31 vulnerabilities found for FortiClient by Fortinet
CERTFR-2025-AVI-0871
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiDLP | FortiDLP toutes versions 10.3.x, 10.4.x, 10.5.x, 11.0.x, 11.1.x, 11.2.x, 11.3.x, 11.4.x, 11.5.x, 12.0.x, 12.1.x | ||
Fortinet | FortiADC | FortiADC toutes versions 6.2.x et 7.0.x | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.0.1 et antérieures à 7.0.14 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions postérieures à 7.2.1 et antérieures à 7.2.10 | ||
Fortinet | FortiTester | FortiTester toutes versions 4.2.x, 7.0.x, 7.1.x, 7.2.x et 7.3.x | ||
Fortinet | FortiManager | FortiManager versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiOS | FortiOS versions 7.6.x antérieures à 7.6.4 | ||
Fortinet | FortiVoice | FortiVoice versions 6.0.7 à 6.0.12 | ||
Fortinet | FortiClient | FortiClientMac toutes versions 7.0.x | ||
Fortinet | FortiSOAR | FortiSOAR on-premise toutes versions 7.3.x et 7.4.x | ||
Fortinet | FortiSIEM | FortiSIEM versions 7.2.x antérieures à 7.2.3 | ||
Fortinet | FortiPAM | FortiPAM toutes versions 1.0.x, 1.1.x, 1.2.x et 1.3.x | ||
Fortinet | FortiSRA | FortiSRA versions 1.5.x antérieures à 1.5.1 | ||
Fortinet | FortiWeb | FortiWeb toutes versions 6.4.x, 7.0.x et 7.2.x | ||
Fortinet | FortiDLP | FortiDLP versions 12.2.x et antérieures à 12.2.3 | ||
Fortinet | FortiManager | FortiManager Cloud versions 7.6.x antérieures à 7.6.3 | ||
Fortinet | FortiSOAR | FortiSOAR on-premise versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiNDR | FortiNDR toutes versions 1.5.x, 7.0.x, 7.1.x et 7.2.x | ||
Fortinet | FortiClient | FortiClientWindows versions 7.4.x antérieures à 7.4.4 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions postérieures à 7.4.1 et antérieures à 7.4.6 | ||
Fortinet | FortiManager | FortiManager versions 7.2.x antérieures à 7.2.10 | ||
Fortinet | FortiVoice | FortiVoice versions 7.0.x antérieures à 7.0.5 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.4.x antérieures à 7.4.7 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.2.x antérieures à 7.2.12 | ||
Fortinet | FortiManager | FortiManager Cloud toutes versions 6.4.x | ||
Fortinet | FortiPAM | FortiPAM versions 1.4.x antérieures à 1.4.3 | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.2.1 et antérieures à 7.2.10 | ||
Fortinet | FortiPAM | FortiPAM versions 1.5.x antérieures à 1.5.1 | ||
Fortinet | FortiSIEM | FortiSIEM toutes versions 6.2.x, 6.3.x, 6.4.x, 6.5.x, 6.6.x, 6.7.x, 7.0.x et 7.1.x | ||
Fortinet | FortiMail | FortiMail versions 7.2.x antérieures à 7.2.7 | ||
Fortinet | FortiSRA | FortiSRA versions 1.4.x antérieures à 1.4.3 | ||
Fortinet | FortiRecorder | FortiRecorder versions 7.0.x antérieures à 7.0.5 | ||
Fortinet | FortiWeb | FortiWeb versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiManager | FortiManager versions 7.4.x antérieures à 7.4.6 | ||
Fortinet | FortiADC | FortiADC versions 7.2.x antérieures à 7.2.4 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.6.x antérieures à 7.6.4 | ||
Fortinet | FortiClient | FortiClientWindows toutes versions 7.0.x | ||
Fortinet | FortiIsolator | FortiIsolator versions 2.4.x antérieures à 2.4.5 | ||
Fortinet | FortiTester | FortiTester version 7.4 antérieures à 7.4.3 | ||
Fortinet | FortiVoice | FortiVoice versions 6.4.x antérieures à 6.4.10 | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.4.1 et antérieures à 7.4.6 | ||
Fortinet | FortiOS | FortiOS toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x, 7.2.x et 7.4.x | ||
Fortinet | FortiIsolator | FortiIsolator toutes versions 2.3.x | ||
Fortinet | FortiADC | FortiADC versions 7.1.x antérieures à 7.1.5 | ||
Fortinet | FortiProxy | FortiProxy toutes versions 1.0.x, 1.1.x, 1.2.x, 2.0.x, 7.0.x, 7.2.x et 7.4.x | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud toutes versions 6.4.x | ||
Fortinet | FortiAnalyzer | FortiAnalyzer toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x et 7.2.x | ||
Fortinet | FortiSwitch | FortiSwitchManager versions 7.2.x antérieures à 7.2.6 | ||
Fortinet | FortiManager | FortiManager versions 7.0.x antérieures à 7.0.14 | ||
Fortinet | FortiManager | FortiManager toutes versions 6.0.x, 6.2.x et 6.4.x | ||
Fortinet | FortiWeb | FortiWeb versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiNDR | FortiNDR versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiProxy | FortiProxy versions 7.6.x antérieures à 7.6.4 | ||
Fortinet | FortiADC | FortiADC versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiNDR | FortiNDR versions 7.4.x antérieures à 7.4.9 | ||
Fortinet | FortiSwitch | FortiSwitchManager versions 7.0.x antérieures à 7.0.4 | ||
Fortinet | FortiMail | FortiMail versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiRecorder | FortiRecorder versions 7.2.x antérieures à 7.2.2 | ||
Fortinet | FortiClient | FortiClientMac versions 7.4.x antérieures à 7.4.4 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions postérieures à 7.0.1 et antérieures à 7.0.14 | ||
Fortinet | FortiClient | FortiClientMac versions 7.2.x antérieures à 7.2.12 | ||
Fortinet | FortiSOAR | FortiSOAR on-premise versions 7.5.x antérieures à 7.5.2 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiDLP toutes versions 10.3.x, 10.4.x, 10.5.x, 11.0.x, 11.1.x, 11.2.x, 11.3.x, 11.4.x, 11.5.x, 12.0.x, 12.1.x", "product": { "name": "FortiDLP", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC toutes versions 6.2.x et 7.0.x", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.0.1 et ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions post\u00e9rieures \u00e0 7.2.1 et ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiTester toutes versions 4.2.x, 7.0.x, 7.1.x, 7.2.x et 7.3.x", "product": { "name": "FortiTester", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.6.x ant\u00e9rieures \u00e0 7.6.4", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 6.0.7 \u00e0 6.0.12", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac toutes versions 7.0.x", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR on-premise toutes versions 7.3.x et 7.4.x", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSIEM versions 7.2.x ant\u00e9rieures \u00e0 7.2.3", "product": { "name": "FortiSIEM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM toutes versions 1.0.x, 1.1.x, 1.2.x et 1.3.x", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSRA versions 1.5.x ant\u00e9rieures \u00e0 1.5.1", "product": { "name": "FortiSRA", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb toutes versions 6.4.x, 7.0.x et 7.2.x", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiDLP versions 12.2.x et ant\u00e9rieures \u00e0 12.2.3", "product": { "name": "FortiDLP", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions 7.6.x ant\u00e9rieures \u00e0 7.6.3", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR on-premise versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR toutes versions 1.5.x, 7.0.x, 7.1.x et 7.2.x", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.4.x ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions post\u00e9rieures \u00e0 7.4.1 et ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 7.0.x ant\u00e9rieures \u00e0 7.0.5", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.4.x ant\u00e9rieures \u00e0 7.4.7", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.2.x ant\u00e9rieures \u00e0 7.2.12", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud toutes versions 6.4.x", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.4.x ant\u00e9rieures \u00e0 1.4.3", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.2.1 et ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.5.x ant\u00e9rieures \u00e0 1.5.1", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSIEM toutes versions 6.2.x, 6.3.x, 6.4.x, 6.5.x, 6.6.x, 6.7.x, 7.0.x et 7.1.x", "product": { "name": "FortiSIEM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.2.x ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSRA versions 1.4.x ant\u00e9rieures \u00e0 1.4.3", "product": { "name": "FortiSRA", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiRecorder versions 7.0.x ant\u00e9rieures \u00e0 7.0.5", "product": { "name": "FortiRecorder", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 7.2.x ant\u00e9rieures \u00e0 7.2.4", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.6.x ant\u00e9rieures \u00e0 7.6.4", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows toutes versions 7.0.x", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiIsolator versions 2.4.x ant\u00e9rieures \u00e0 2.4.5", "product": { "name": "FortiIsolator", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiTester version 7.4 ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiTester", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 6.4.x ant\u00e9rieures \u00e0 6.4.10", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.4.1 et ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x, 7.2.x et 7.4.x", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiIsolator toutes versions 2.3.x", "product": { "name": "FortiIsolator", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 7.1.x ant\u00e9rieures \u00e0 7.1.5", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy toutes versions 1.0.x, 1.1.x, 1.2.x, 2.0.x, 7.0.x, 7.2.x et 7.4.x", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud toutes versions 6.4.x", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x et 7.2.x", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitchManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager toutes versions 6.0.x, 6.2.x et 6.4.x", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.6.x ant\u00e9rieures \u00e0 7.6.4", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions 7.4.x ant\u00e9rieures \u00e0 7.4.9", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitchManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.4", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiRecorder versions 7.2.x ant\u00e9rieures \u00e0 7.2.2", "product": { "name": "FortiRecorder", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.4.x ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions post\u00e9rieures \u00e0 7.0.1 et ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.2.x ant\u00e9rieures \u00e0 7.2.12", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR on-premise versions 7.5.x ant\u00e9rieures \u00e0 7.5.2", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-58325", "url": "https://www.cve.org/CVERecord?id=CVE-2025-58325" }, { "name": "CVE-2025-46752", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46752" }, { "name": "CVE-2025-31365", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31365" }, { "name": "CVE-2025-49201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-49201" }, { "name": "CVE-2025-54822", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54822" }, { "name": "CVE-2025-57741", "url": "https://www.cve.org/CVERecord?id=CVE-2025-57741" }, { "name": "CVE-2025-58903", "url": "https://www.cve.org/CVERecord?id=CVE-2025-58903" }, { "name": "CVE-2025-31514", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31514" }, { "name": "CVE-2025-25253", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25253" }, { "name": "CVE-2024-33507", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33507" }, { "name": "CVE-2025-25255", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25255" }, { "name": "CVE-2023-46718", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46718" }, { "name": "CVE-2025-47890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47890" }, { "name": "CVE-2025-54988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988" }, { "name": "CVE-2024-26008", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26008" }, { "name": "CVE-2025-25252", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25252" }, { "name": "CVE-2024-48891", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48891" }, { "name": "CVE-2025-59921", "url": "https://www.cve.org/CVERecord?id=CVE-2025-59921" }, { "name": "CVE-2025-53951", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53951" }, { "name": "CVE-2025-53950", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53950" }, { "name": "CVE-2025-58324", "url": "https://www.cve.org/CVERecord?id=CVE-2025-58324" }, { "name": "CVE-2025-53845", "url": "https://www.cve.org/CVERecord?id=CVE-2025-53845" }, { "name": "CVE-2024-50571", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50571" }, { "name": "CVE-2025-46774", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46774" }, { "name": "CVE-2025-31366", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31366" }, { "name": "CVE-2025-57716", "url": "https://www.cve.org/CVERecord?id=CVE-2025-57716" }, { "name": "CVE-2024-47569", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47569" }, { "name": "CVE-2025-22258", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22258" }, { "name": "CVE-2025-57740", "url": "https://www.cve.org/CVERecord?id=CVE-2025-57740" }, { "name": "CVE-2025-54973", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54973" }, { "name": "CVE-2025-54658", "url": "https://www.cve.org/CVERecord?id=CVE-2025-54658" } ], "initial_release_date": "2025-10-15T00:00:00", "last_revision_date": "2025-10-15T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0871", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-372", "url": "https://www.fortiguard.com/psirt/FG-IR-24-372" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-412", "url": "https://www.fortiguard.com/psirt/FG-IR-24-412" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-228", "url": "https://www.fortiguard.com/psirt/FG-IR-24-228" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-280", "url": "https://www.fortiguard.com/psirt/FG-IR-24-280" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-685", "url": "https://www.fortiguard.com/psirt/FG-IR-25-685" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-452", "url": "https://www.fortiguard.com/psirt/FG-IR-24-452" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-487", "url": "https://www.fortiguard.com/psirt/FG-IR-24-487" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-639", "url": "https://www.fortiguard.com/psirt/FG-IR-25-639" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-037", "url": "https://www.fortiguard.com/psirt/FG-IR-25-037" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-684", "url": "https://www.fortiguard.com/psirt/FG-IR-25-684" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-354", "url": "https://www.fortiguard.com/psirt/FG-IR-23-354" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-041", "url": "https://www.fortiguard.com/psirt/FG-IR-24-041" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-198", "url": "https://www.fortiguard.com/psirt/FG-IR-25-198" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-160", "url": "https://www.fortiguard.com/psirt/FG-IR-25-160" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-361", "url": "https://www.fortiguard.com/psirt/FG-IR-24-361" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-861", "url": "https://www.fortiguard.com/psirt/FG-IR-25-861" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-542", "url": "https://www.fortiguard.com/psirt/FG-IR-24-542" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-771", "url": "https://www.fortiguard.com/psirt/FG-IR-25-771" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-010", "url": "https://www.fortiguard.com/psirt/FG-IR-25-010" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-378", "url": "https://www.fortiguard.com/psirt/FG-IR-25-378" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-442", "url": "https://www.fortiguard.com/psirt/FG-IR-24-442" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-664", "url": "https://www.fortiguard.com/psirt/FG-IR-25-664" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-756", "url": "https://www.fortiguard.com/psirt/FG-IR-25-756" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-126", "url": "https://www.fortiguard.com/psirt/FG-IR-25-126" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-628", "url": "https://www.fortiguard.com/psirt/FG-IR-25-628" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-457", "url": "https://www.fortiguard.com/psirt/FG-IR-24-457" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-062", "url": "https://www.fortiguard.com/psirt/FG-IR-24-062" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-546", "url": "https://www.fortiguard.com/psirt/FG-IR-24-546" }, { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-653", "url": "https://www.fortiguard.com/psirt/FG-IR-25-653" } ] }
CERTFR-2025-AVI-0496
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiProxy | FortiProxy versions 7.4.x antérieures à 7.4.9 | ||
Fortinet | FortiProxy | FortiProxy toutes versions 7.2.x | ||
Fortinet | FortiProxy | FortiProxy toutes versions 1.1.x | ||
Fortinet | FortiPortal | FortiPortal versions 7.0.x antérieures à 7.0.9 | ||
Fortinet | FortiPAM | FortiPAM versions 1.4.x antérieures à 1.4.2 | ||
Fortinet | FortiADC | FortiADC toutes versions 7.0.x | ||
Fortinet | FortiClient | FortiClientEMS versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiOS | FortiOS versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiWeb | FortiWeb versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiClient | FortiClientEMS versions 7.2.x antérieures à 7.2.7 | ||
Fortinet | FortiOS | FortiOS toutes versions 6.4.x | ||
Fortinet | FortiClient | FortiClientWindows versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiProxy | FortiProxy toutes versions 1.2.x | ||
Fortinet | FortiADC | FortiADC versions 7.2.x antérieures à 7.2.8 | ||
Fortinet | FortiOS | FortiOS toutes versions 7.0.x | ||
Fortinet | FortiWeb | FortiWeb versions 7.4.x antérieures à 7.4.7 | ||
Fortinet | FortiOS | FortiOS toutes versions 6.2.x | ||
Fortinet | FortiPAM | FortiPAM versions 1.1.x antérieures à 1.1.3 | ||
Fortinet | FortiPortal | FortiPortal versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiClient | FortiClientWindows toutes versions 7.0.x | ||
Fortinet | FortiClient | FortiClientEMS toutes versions 6.4.x | ||
Fortinet | FortiOS | FortiOS toutes versions 7.2.x | ||
Fortinet | FortiProxy | FortiProxy versions 7.6.x antérieures à 7.6.3 | ||
Fortinet | FortiADC | FortiADC versions 7.4.x antérieures à 7.4.7 | ||
Fortinet | FortiADC | FortiADC toutes versions 6.2.x | ||
Fortinet | FortiPAM | FortiPAM versions 1.3.x antérieures à 1.3.1 | ||
Fortinet | FortiADC | FortiADC versions 7.1.x antérieures à 7.1.5 | ||
Fortinet | FortiSRA | FortiSRA versions 1.4.x antérieures à 1.4.2 | ||
Fortinet | FortiProxy | FortiProxy toutes versions 2.0.x | ||
Fortinet | FortiClient | FortiClientWindows versions 7.2.x antérieures à 7.2.7 | ||
Fortinet | FortiADC | FortiADC toutes versions 6.1.x | ||
Fortinet | FortiOS | FortiOS versions 7.4.x antérieures à 7.4.8 | ||
Fortinet | FortiProxy | FortiProxy toutes versions 7.0.x | ||
Fortinet | FortiADC | FortiADC versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiPAM | FortiPAM versions 1.2.x antérieures à 1.2.1 | ||
Fortinet | FortiClient | FortiClientEMS toutes versions 6.2.x | ||
Fortinet | FortiPAM | FortiPAM versions 1.0.x antérieures à 1.0.4 | ||
Fortinet | FortiPortal | FortiPortal versions 7.2.x antérieures à 7.2.6 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiProxy versions 7.4.x ant\u00e9rieures \u00e0 7.4.9", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy toutes versions 7.2.x", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy toutes versions 1.1.x", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.0.x ant\u00e9rieures \u00e0 7.0.9", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.4.x ant\u00e9rieures \u00e0 1.4.2", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC toutes versions 7.0.x", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions 7.2.x ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS toutes versions 6.4.x", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy toutes versions 1.2.x", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 7.2.x ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS toutes versions 7.0.x", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.4.x ant\u00e9rieures \u00e0 7.4.7", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS toutes versions 6.2.x", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.1.x ant\u00e9rieures \u00e0 1.1.3", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows toutes versions 7.0.x", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS toutes versions 6.4.x", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS toutes versions 7.2.x", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.6.x ant\u00e9rieures \u00e0 7.6.3", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 7.4.x ant\u00e9rieures \u00e0 7.4.7", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC toutes versions 6.2.x", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.3.x ant\u00e9rieures \u00e0 1.3.1", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 7.1.x ant\u00e9rieures \u00e0 7.1.5", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSRA versions 1.4.x ant\u00e9rieures \u00e0 1.4.2", "product": { "name": "FortiSRA", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy toutes versions 2.0.x", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.2.x ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC toutes versions 6.1.x", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.4.x ant\u00e9rieures \u00e0 7.4.8", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy toutes versions 7.0.x", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.2.x ant\u00e9rieures \u00e0 1.2.1", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS toutes versions 6.2.x", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.0.x ant\u00e9rieures \u00e0 1.0.4", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-32119", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32119" }, { "name": "CVE-2023-48786", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48786" }, { "name": "CVE-2024-50562", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50562" }, { "name": "CVE-2025-22256", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22256" }, { "name": "CVE-2023-29184", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29184" }, { "name": "CVE-2024-54019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54019" }, { "name": "CVE-2025-24471", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24471" }, { "name": "CVE-2025-31104", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31104" }, { "name": "CVE-2024-45329", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45329" }, { "name": "CVE-2024-50568", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50568" }, { "name": "CVE-2025-25250", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25250" }, { "name": "CVE-2025-22251", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22251" }, { "name": "CVE-2025-22254", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22254" }, { "name": "CVE-2025-22862", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22862" } ], "initial_release_date": "2025-06-11T00:00:00", "last_revision_date": "2025-06-11T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0496", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-11T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-385", "url": "https://www.fortiguard.com/psirt/FG-IR-24-385" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-274", "url": "https://www.fortiguard.com/psirt/FG-IR-24-274" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-257", "url": "https://www.fortiguard.com/psirt/FG-IR-24-257" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-099", "url": "https://www.fortiguard.com/psirt/FG-IR-25-099" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-375", "url": "https://www.fortiguard.com/psirt/FG-IR-23-375" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-058", "url": "https://www.fortiguard.com/psirt/FG-IR-24-058" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-008", "url": "https://www.fortiguard.com/psirt/FG-IR-23-008" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-006", "url": "https://www.fortiguard.com/psirt/FG-IR-25-006" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-287", "url": "https://www.fortiguard.com/psirt/FG-IR-24-287" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-342", "url": "https://www.fortiguard.com/psirt/FG-IR-23-342" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-008", "url": "https://www.fortiguard.com/psirt/FG-IR-25-008" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-544", "url": "https://www.fortiguard.com/psirt/FG-IR-24-544" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-339", "url": "https://www.fortiguard.com/psirt/FG-IR-24-339" }, { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-365", "url": "https://www.fortiguard.com/psirt/FG-IR-24-365" } ] }
CERTFR-2025-AVI-0399
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Fortinet indique que la vulnérabilité CVE-2025-32756 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClientMac versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiPortal | FortiPortal versions 7.0.x antérieures à 7.0.10 | ||
Fortinet | FortiMail | FortiMail versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiOS | FortiOS versions 7.4.x antérieures à 7.4.7 | ||
Fortinet | FortiNDR | FortiNDR versions 7.1.x à 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiNDR | FortiNDR versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiManager | FortiManager versions 7.2.x antérieures à 7.2.2 | ||
Fortinet | FortiMail | FortiMail versions 7.6.x antérieures à 7.6.3 | ||
Fortinet | FortiClientEMS | FortiClientEMS Cloud versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiRecorder | FortiRecorder versions 7.0.x antérieures à 7.0.6 | ||
Fortinet | FortiManager | FortiManager versions 7.0.x antérieures à 7.0.8 | ||
Fortinet | FortiVoice | FortiVoice versions 7.2.x antérieures à 7.2.1 | ||
Fortinet | FortiRecorder | FortiRecorder versions 7.2.x antérieures à 7.2.4 | ||
Fortinet | FortiNDR | FortiNDR versions antérieures à 7.0.7 | ||
Fortinet | FortiOS | FortiOS versions 7.2.x antérieures à 7.2.8 | ||
Fortinet | FortiProxy | FortiProxy versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiOS | FortiOS versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiVoice | FortiVoice versions 7.0.x antérieures à 7.0.7 | ||
Fortinet | FortiClient | FortiClientMac versions 7.x antérieures à 7.2.9 | ||
Fortinet | FortiRecorder | FortiRecorder versions 6.4.x antérieures à 6.4.6 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.2.x antérieures à 7.2.2 | ||
Fortinet | FortiCamera | FortiCamera versions antérieures à 2.1.4 | ||
Fortinet | FortiPortal | FortiPortal versions 7.4.x antérieures à 7.4.2 | ||
Fortinet | FortiClientEMS | FortiClientEMS versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiSwitch | FortiSwitchManager versions 7.2.x antérieures à 7.2.6 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 7.0.15 | ||
Fortinet | FortiMail | FortiMail versions 7.2.x antérieures à 7.2.8 | ||
Fortinet | FortiVoice | FortiVoiceUCDesktop versions antérieures à 7.0 | ||
Fortinet | FortiVoice | FortiVoice versions 6.4.x antérieures à 6.4.11 | ||
Fortinet | FortiNDR | FortiNDR versions 7.4.x antérieures à 7.4.8 | ||
Fortinet | FortiMail | FortiMail versions 7.0.x antérieures à 7.0.9 | ||
Fortinet | FortiPortal | FortiPortal versions 7.2.x antérieures à 7.2.6 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClientMac versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.0.x ant\u00e9rieures \u00e0 7.0.10", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.4.x ant\u00e9rieures \u00e0 7.4.7", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions 7.1.x \u00e0 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.2", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.6.x ant\u00e9rieures \u00e0 7.6.3", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS Cloud versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiClientEMS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiRecorder versions 7.0.x ant\u00e9rieures \u00e0 7.0.6", "product": { "name": "FortiRecorder", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.8", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 7.2.x ant\u00e9rieures \u00e0 7.2.1", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiRecorder versions 7.2.x ant\u00e9rieures \u00e0 7.2.4", "product": { "name": "FortiRecorder", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions ant\u00e9rieures \u00e0 7.0.7", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.2.x ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 7.0.x ant\u00e9rieures \u00e0 7.0.7", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.x ant\u00e9rieures \u00e0 7.2.9", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiRecorder versions 6.4.x ant\u00e9rieures \u00e0 6.4.6", "product": { "name": "FortiRecorder", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.2.x ant\u00e9rieures \u00e0 7.2.2", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiCamera versions ant\u00e9rieures \u00e0 2.1.4", "product": { "name": "FortiCamera", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.4.x ant\u00e9rieures \u00e0 7.4.2", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiClientEMS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitchManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 7.0.15", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.2.x ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoiceUCDesktop versions ant\u00e9rieures \u00e0 7.0", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 6.4.x ant\u00e9rieures \u00e0 6.4.11", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions 7.4.x ant\u00e9rieures \u00e0 7.4.8", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.0.x ant\u00e9rieures \u00e0 7.0.9", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-25251", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25251" }, { "name": "CVE-2025-47294", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47294" }, { "name": "CVE-2025-24473", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24473" }, { "name": "CVE-2024-54020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54020" }, { "name": "CVE-2025-46777", "url": "https://www.cve.org/CVERecord?id=CVE-2025-46777" }, { "name": "CVE-2024-35281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35281" }, { "name": "CVE-2025-32756", "url": "https://www.cve.org/CVERecord?id=CVE-2025-32756" }, { "name": "CVE-2025-22252", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22252" }, { "name": "CVE-2025-47295", "url": "https://www.cve.org/CVERecord?id=CVE-2025-47295" }, { "name": "CVE-2025-22859", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22859" } ], "initial_release_date": "2025-05-13T00:00:00", "last_revision_date": "2025-05-13T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0399", "revisions": [ { "description": "Version initiale", "revision_date": "2025-05-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nFortinet indique que la vuln\u00e9rabilit\u00e9 CVE-2025-32756 est activement exploit\u00e9e.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-472", "url": "https://www.fortiguard.com/psirt/FG-IR-24-472" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-552", "url": "https://www.fortiguard.com/psirt/FG-IR-24-552" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-381", "url": "https://www.fortiguard.com/psirt/FG-IR-24-381" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-548", "url": "https://www.fortiguard.com/psirt/FG-IR-24-548" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-025", "url": "https://www.fortiguard.com/psirt/FG-IR-24-025" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-388", "url": "https://www.fortiguard.com/psirt/FG-IR-24-388" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-380", "url": "https://www.fortiguard.com/psirt/FG-IR-24-380" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-016", "url": "https://www.fortiguard.com/psirt/FG-IR-25-016" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-254", "url": "https://www.fortiguard.com/psirt/FG-IR-25-254" }, { "published_at": "2025-05-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-023", "url": "https://www.fortiguard.com/psirt/FG-IR-24-023" } ] }
CERTFR-2025-AVI-0293
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiManager | FortiManager versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiProxy | FortiProxy versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiManager | FortiManager versions 7.2.x antérieures à 7.2.9 | ||
Fortinet | FortiManager | FortiManager versions 6.4.x antérieures à 6.4.15 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.0.x antérieures à 7.0.14 | ||
Fortinet | FortiOS | FortiOS versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.4.x antérieures à 7.4.6 | ||
Fortinet | FortiWeb | FortiWeb versions 7.6.x antérieures à 7.6.3 | ||
Fortinet | FortiWeb | FortiWeb versions antérieures à 7.4.7 | ||
Fortinet | FortiSwitch | FortiSwitch versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiOS | FortiOS versions 6.2.x antérieures à 6.2.17 | ||
Fortinet | FortiSwitch | FortiSwitch versions 6.4.x antérieures à 6.4.15 | ||
Fortinet | FortiVoice | FortiVoice versions 7.0.x antérieures à 7.0.3 | ||
Fortinet | FortiSwitch | FortiSwitch versions 7.2.x antérieures à 7.2.9 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 6.4.15 | ||
Fortinet | FortiManager | FortiManager versions 7.4.x antérieures à 7.4.6 | ||
Fortinet | FortiClient | FortiClientEMS versions antérieures à 7.4.3 | ||
Fortinet | FortiManager | FortiManager versions 6.2.x antérieures à 6.2.14 | ||
Fortinet | FortiSwitch | FortiSwitch versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 7.6 pour la vulnérabilité CVE-2024-32122 | ||
Fortinet | FortiVoice | FortiVoice versions antérieures à 6.4.9 | ||
Fortinet | FortiOS | FortiOS versions 7.0.x antérieures à 7.0.16 | ||
Fortinet | FortiSwitch | FortiSwitch versions 7.0.x antérieures à 7.0.11 | ||
Fortinet | FortiManager | FortiManager versions 7.0.x antérieures à 7.0.14 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.2.x antérieures à 7.2.9 | ||
Fortinet | FortiOS | FortiOS versions 7.2.x antérieures à 7.2.9 | ||
Fortinet | FortiIsolator | FortiIsolator versions postérieures à 2.4.3 et antérieures à 2.4.7 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 6.4.x antérieures à 6.4.15 | ||
Fortinet | FortiProxy | FortiProxy versions antérieures à 7.0.16 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 6.2.x antérieures à 6.2.14 | ||
Fortinet | FortiProxy | FortiProxy versions 7.2.x antérieures à 7.2.10 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiAnalyzer versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.9", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 6.4.x ant\u00e9rieures \u00e0 6.4.15", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.0.x ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.4.x ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.6.x ant\u00e9rieures \u00e0 7.6.3", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions ant\u00e9rieures \u00e0 7.4.7", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 6.2.x ant\u00e9rieures \u00e0 6.2.17", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 6.4.x ant\u00e9rieures \u00e0 6.4.15", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 7.0.x ant\u00e9rieures \u00e0 7.0.3", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 7.2.x ant\u00e9rieures \u00e0 7.2.9", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 6.4.15", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 6.2.x ant\u00e9rieures \u00e0 6.2.14", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 7.6 pour la vuln\u00e9rabilit\u00e9 CVE-2024-32122", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions ant\u00e9rieures \u00e0 6.4.9", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.0.x ant\u00e9rieures \u00e0 7.0.16", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 7.0.x ant\u00e9rieures \u00e0 7.0.11", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.2.x ant\u00e9rieures \u00e0 7.2.9", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.2.x ant\u00e9rieures \u00e0 7.2.9", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiIsolator versions post\u00e9rieures \u00e0 2.4.3 et ant\u00e9rieures \u00e0 2.4.7", "product": { "name": "FortiIsolator", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 6.4.x ant\u00e9rieures \u00e0 6.4.15", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions ant\u00e9rieures \u00e0 7.0.16", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 6.2.x ant\u00e9rieures \u00e0 6.2.14", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.2.x ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-46671", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46671" }, { "name": "CVE-2024-32122", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32122" }, { "name": "CVE-2024-50565", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50565" }, { "name": "CVE-2024-26013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26013" }, { "name": "CVE-2024-54025", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54025" }, { "name": "CVE-2024-48887", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48887" }, { "name": "CVE-2025-22855", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22855" }, { "name": "CVE-2024-52962", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52962" }, { "name": "CVE-2023-37930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37930" }, { "name": "CVE-2025-25254", "url": "https://www.cve.org/CVERecord?id=CVE-2025-25254" }, { "name": "CVE-2024-54024", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54024" } ], "initial_release_date": "2025-04-09T00:00:00", "last_revision_date": "2025-04-09T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0293", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-09T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-474", "url": "https://www.fortiguard.com/psirt/FG-IR-24-474" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-435", "url": "https://www.fortiguard.com/psirt/FG-IR-24-435" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-165", "url": "https://www.fortiguard.com/psirt/FG-IR-23-165" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-184", "url": "https://www.fortiguard.com/psirt/FG-IR-24-184" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-111", "url": "https://www.fortiguard.com/psirt/FG-IR-24-111" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-453", "url": "https://www.fortiguard.com/psirt/FG-IR-24-453" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-344", "url": "https://www.fortiguard.com/psirt/FG-IR-23-344" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-046", "url": "https://www.fortiguard.com/psirt/FG-IR-24-046" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-392", "url": "https://www.fortiguard.com/psirt/FG-IR-24-392" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-397", "url": "https://www.fortiguard.com/psirt/FG-IR-24-397" } ] }
CERTFR-2025-AVI-0120
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiManager | FortiManager versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 7.0.16 | ||
Fortinet | FortiPAM | FortiPAM versions 1.1.x antérieures à 1.2.0 | ||
Fortinet | FortiProxy | FortiProxy versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiProxy | FortiProxy versions antérieures à 7.0.14 | ||
Fortinet | FortiWeb | FortiWeb versions antérieures à 7.4.6 | ||
Fortinet | FortiSwitch | FortiSwitchManager versions 7.0.x antérieures à 7.0.3 | ||
Fortinet | FortiOS | FortiOS versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiSwitch | FortiSwitchManager versions 7.2.x antérieures à 7.2.3 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer-BigData versions antérieures à 7.4.1 | ||
Fortinet | FortiPortal | FortiPortal versions 7.2.x antérieures à 7.2.7 | ||
Fortinet | FortiManager | FortiManager Cloud versions antérieures à 7.2.9 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiOS | FortiOS versions 7.2.x antérieures à 7.2.10 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions antérieures à 7.2.8 | ||
Fortinet | FortiManager | FortiManager versions antérieures à 7.2.10 | ||
Fortinet | FortiOS | FortiOS versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiSandbox | FortiSandbox versions 4.4.x antérieures à 4.4.5 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer-BigData versions 7.2.x antérieures à 7.2.8 | ||
Fortinet | FortiPortal | FortiPortal versions 7.0.x antérieures à 7.0.12 | ||
Fortinet | FortiManager | FortiManager versions 7.4.x antérieures à 7.4.6 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions 7.4.x antérieures à 7.4.4 | ||
Fortinet | FortiSIEM | FortiSIEM versions 6.7.x, 7.0.x et 7.1.x | ||
Fortinet | FortiProxy | FortiProxy versions 7.2.x antérieures à 7.2.8 | ||
Fortinet | FortiClient | FortiClientMac versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiClient | FortiClientMac versions 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiSandbox | FortiSandbox versions antérieures à 4.0.5 | ||
Fortinet | FortiClient | FortiClientMac versions 7.0.x antérieures à 7.0.13 | ||
Fortinet | FortiPortal | FortiPortal versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiSandbox | FortiSandbox versions 4.2.x antérieures à 4.2.7 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.2.x antérieures à 7.2.7 | ||
Fortinet | FortiWeb | FortiWeb versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiManager | FortiManager Cloud versions 7.4.x antérieures à 7.4.6 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions antérieures à 7.2.6 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.0.x antérieures à 7.0.14 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiManager versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 7.0.16", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions 1.1.x ant\u00e9rieures \u00e0 1.2.0", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitchManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.3", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitchManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.3", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer-BigData versions ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.2.x ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions ant\u00e9rieures \u00e0 7.2.9", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.2.x ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions 4.4.x ant\u00e9rieures \u00e0 4.4.5", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer-BigData versions 7.2.x ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.0.x ant\u00e9rieures \u00e0 7.0.12", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions 7.4.x ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSIEM versions 6.7.x, 7.0.x et 7.1.x", "product": { "name": "FortiSIEM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.2.x ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions ant\u00e9rieures \u00e0 4.0.5", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.0.x ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions 4.2.x ant\u00e9rieures \u00e0 4.2.7", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.2.x ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions 7.4.x ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.0.x ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-50567", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50567" }, { "name": "CVE-2024-40586", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40586" }, { "name": "CVE-2024-50569", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50569" }, { "name": "CVE-2023-40721", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40721" }, { "name": "CVE-2024-52968", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52968" }, { "name": "CVE-2024-27781", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27781" }, { "name": "CVE-2024-27780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27780" }, { "name": "CVE-2024-36508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36508" }, { "name": "CVE-2024-40585", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40585" }, { "name": "CVE-2025-24470", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24470" }, { "name": "CVE-2024-35279", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35279" }, { "name": "CVE-2024-40591", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40591" }, { "name": "CVE-2024-33504", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33504" }, { "name": "CVE-2024-40584", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40584" }, { "name": "CVE-2024-52966", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52966" } ], "initial_release_date": "2025-02-12T00:00:00", "last_revision_date": "2025-02-12T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0120", "revisions": [ { "description": "Version initiale", "revision_date": "2025-02-12T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-438", "url": "https://www.fortiguard.com/psirt/FG-IR-24-438" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-220", "url": "https://www.fortiguard.com/psirt/FG-IR-24-220" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-261", "url": "https://www.fortiguard.com/psirt/FG-IR-23-261" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-324", "url": "https://www.fortiguard.com/psirt/FG-IR-23-324" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-094", "url": "https://www.fortiguard.com/psirt/FG-IR-24-094" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-302", "url": "https://www.fortiguard.com/psirt/FG-IR-24-302" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-160", "url": "https://www.fortiguard.com/psirt/FG-IR-24-160" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-300", "url": "https://www.fortiguard.com/psirt/FG-IR-24-300" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-147", "url": "https://www.fortiguard.com/psirt/FG-IR-24-147" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-063", "url": "https://www.fortiguard.com/psirt/FG-IR-24-063" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-279", "url": "https://www.fortiguard.com/psirt/FG-IR-23-279" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-311", "url": "https://www.fortiguard.com/psirt/FG-IR-24-311" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-422", "url": "https://www.fortiguard.com/psirt/FG-IR-24-422" }, { "published_at": "2025-02-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-015", "url": "https://www.fortiguard.com/psirt/FG-IR-25-015" } ] }
CERTFR-2025-AVI-0031
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClientMac versions antérieures à 7.2.5 | ||
Fortinet | FortiDDoS-F | FortiDDoS-F versions antérieures à 6.3.3 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 7.6.1 pour la vulnérabilité CVE-2024-52963 | ||
Fortinet | FortiRecorder | FortiRecorder versions antérieures à 7.0.5 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.2.x antérieures à 7.2.6 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.0.x antérieures à 7.0.13 | ||
Fortinet | FortiSOAR | FortiSOAR versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiManager | FortiManager versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiSOAR | Connecteur IMAP pour FortiSOAR versions antérieures à 3.5.8 | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.4.1 et antérieures à 7.4.4 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 7.0.16 | ||
Fortinet | FortiPortal | FortiPortal versions 7.0.x antérieures à 7.0.9 | ||
Fortinet | FortiWLC | FortiWLC versions 8.6.x antérieures à 8.6.6 | ||
Fortinet | FortiManager | FortiManager versions 6.4.x antérieures à 6.4.15 | ||
Fortinet | FortiClient | FortiClientEMS versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiClient | FortiClientEMS Cloud versions antérieures à 7.2.5 | ||
Fortinet | FortiClient | FortiClientEMS Cloud versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiPortal | FortiPortal versions 6.0.x antérieures à 6.0.15 | ||
Fortinet | FortiClient | FortiClientMac versions antérieures à 7.4.0 | ||
Fortinet | FortiOS | FortiOS versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiMail | FortiMail versions 6.4x antérieures à 6.4.8 | ||
Fortinet | FortiManager | FortiManager versions 7.0.x antérieures à 7.0.13 | ||
Fortinet | FortiVoiceEnterprise | FortiVoiceEnterprise versions antérieures à 6.0.10 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions 7.4.x postérieures à 7.4.1 et antérieures à 7.4.4 | ||
Fortinet | FortiWeb | FortiWeb versions 7.2.x antérieures à 7.2.8 | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.2.1 et antérieures à 7.2.7 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions 7.2.x postérieures à 7.2.1 et antérieures à 7.2.7 | ||
Fortinet | FortiSwitch | FortiSwitch versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiWeb | FortiWeb versions 7.6.x antérieures à 7.6.2 | ||
Fortinet | FortiAP-W2 | FortiAP-W2 versions antérieures à 7.2.4 | ||
Fortinet | FortiClient | FortiClientEMS versions antérieures à 7.2.5 | ||
Fortinet | FortiVoice | FortiVoice versions 7.0.x antérieures à 7.0.5 | ||
Fortinet | FortiOS | FortiOS versions 7.2.x antérieures à 7.2.10 | ||
Fortinet | FortiSwitch | FortiSwitch versions 7.2.x antérieures à 7.2.6 | ||
Fortinet | FortiDDoS | FortiDDoS versions antérieures à 5.5.1 | ||
Fortinet | FortiAP | FortiAP versions antérieures à 7.2.4 | ||
Fortinet | FortiSwitch | FortiSwitch versions antérieures à 6.2.8 | ||
Fortinet | FortiClient | FortiClientWindows versions antérieures à 7.4.1 | ||
Fortinet | FortiSOAR | FortiSOAR versions antérieures à 7.2.2 Security Patch 9 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer-BigData versions 7.2.x antérieures à 7.2.6 | ||
Fortinet | FortiDeceptor | FortiDeceptor versions antérieures à 6.0.1 | ||
Fortinet | FortiAP-S | FortiAP-S versions antérieures à 6.4.10 | ||
Fortinet | FortiVoiceEnterprise | FortiVoiceEnterprise versions 6.4.x antérieures à 6.4.4 | ||
Fortinet | FortiAuthenticator | FortiAuthenticator versions antérieures à 6.3.3 | ||
Fortinet | FortiPortal | FortiPortal versions 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiProxy | FortiProxy versions 7.0.x antérieures à 7.0.19 | ||
Fortinet | FortiOS | FortiOS versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.4.x antérieures à 7.4.4 | ||
Fortinet | FortiWeb | FortiWeb versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiManager | FortiManager Cloud versions antérieures à 7.0.13 | ||
Fortinet | FortiSandbox | FortiSandbox versions 4.4.x antérieures à 4.4.5 | ||
Fortinet | FortiAP | FortiAP versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiClient | FortiClientLinux versions antérieures à 7.2.5 | ||
Fortinet | FortiSwitch | FortiSwitch versions 6.4.x antérieures à 6.4.14 | ||
Fortinet | FortiNDR | FortiNDR versions antérieures à 7.2.2 | ||
Fortinet | FortiManager | FortiManager versions 6.2.x antérieures à 6.2.12 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions antérieures à 7.0.12 | ||
Fortinet | FortiManager | FortiManager versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiMail | FortiMail versions 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiNDR | FortiNDR versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiProxy | FortiProxy versions 2.0.x antérieures à 2.0.15 | ||
Fortinet | FortiSOAR | FortiSOAR versions 7.3.x antérieures à 7.3.3 | ||
Fortinet | FortiManager | FortiManager versions 7.2.x antérieures à 7.2.6 | ||
Fortinet | FortiClient | FortiClientLinux versions antérieures à 7.4.0 | ||
Fortinet | FortiSIEM | FortiSIEM versions antérieures à 7.1.6 | ||
Fortinet | FortiSandbox | FortiSandbox versions antérieures à 4.0.5 | ||
Fortinet | FortiAP-W2 | FortiAP-W2 versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiSandbox | FortiSandbox versions 4.2.x antérieures à 4.2.7 | ||
Fortinet | FortiADC | FortiADC versions 6.2.x antérieures à 6.2.4 | ||
Fortinet | FortiProxy | FortiProxy versions 7.4.x antérieures à 7.4.6 | ||
Fortinet | FortiSwitch | FortiSwitch versions 7.0.x antérieures à 7.0.8 | ||
Fortinet | FortiTester | FortiTester versions antérieures à 7.2.1 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 6.4.x antérieures à 6.4.15 | ||
Fortinet | FortiAuthenticator | FortiAuthenticator versions 6.4.x antérieures à 6.4.1 | ||
Fortinet | FortiVoice | FortiVoice versions antérieures à 6.4.10 | ||
Fortinet | FortiProxy | FortiProxy versions 7.2.x antérieures à 7.2.12 | ||
Fortinet | FortiSOAR | FortiSOAR versions 7.5.x antérieures à 7.5.1 | ||
Fortinet | FortiRecorder | FortiRecorder versions 7.2.x antérieures à 7.2.2 | ||
Fortinet | FortiMail | FortiMail versions 7.0.x antérieures à 7.0.7 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClientMac versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiDDoS-F versions ant\u00e9rieures \u00e0 6.3.3", "product": { "name": "FortiDDoS-F", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 7.6.1 pour la vuln\u00e9rabilit\u00e9 CVE-2024-52963", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiRecorder versions ant\u00e9rieures \u00e0 7.0.5", "product": { "name": "FortiRecorder", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.0.x ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Connecteur IMAP pour FortiSOAR versions ant\u00e9rieures \u00e0 3.5.8", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.4.1 et ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 7.0.16", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.0.x ant\u00e9rieures \u00e0 7.0.9", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWLC versions 8.6.x ant\u00e9rieures \u00e0 8.6.6", "product": { "name": "FortiWLC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 6.4.x ant\u00e9rieures \u00e0 6.4.15", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS Cloud versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS Cloud versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 6.0.x ant\u00e9rieures \u00e0 6.0.15", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions ant\u00e9rieures \u00e0 7.4.0", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 6.4x ant\u00e9rieures \u00e0 6.4.8", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoiceEnterprise versions ant\u00e9rieures \u00e0 6.0.10", "product": { "name": "FortiVoiceEnterprise", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions 7.4.x post\u00e9rieures \u00e0 7.4.1 et ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.2.x ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.2.1 et ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions 7.2.x post\u00e9rieures \u00e0 7.2.1 et ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.6.x ant\u00e9rieures \u00e0 7.6.2", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-W2 versions ant\u00e9rieures \u00e0 7.2.4", "product": { "name": "FortiAP-W2", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions 7.0.x ant\u00e9rieures \u00e0 7.0.5", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.2.x ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiDDoS versions ant\u00e9rieures \u00e0 5.5.1", "product": { "name": "FortiDDoS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP versions ant\u00e9rieures \u00e0 7.2.4", "product": { "name": "FortiAP", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions ant\u00e9rieures \u00e0 6.2.8", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR versions ant\u00e9rieures \u00e0 7.2.2 Security Patch 9", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer-BigData versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiDeceptor versions ant\u00e9rieures \u00e0 6.0.1", "product": { "name": "FortiDeceptor", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-S versions ant\u00e9rieures \u00e0 6.4.10", "product": { "name": "FortiAP-S", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoiceEnterprise versions 6.4.x ant\u00e9rieures \u00e0 6.4.4", "product": { "name": "FortiVoiceEnterprise", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAuthenticator versions ant\u00e9rieures \u00e0 6.3.3", "product": { "name": "FortiAuthenticator", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.0.x ant\u00e9rieures \u00e0 7.0.19", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.4.x ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions 4.4.x ant\u00e9rieures \u00e0 4.4.5", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiAP", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientLinux versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 6.4.x ant\u00e9rieures \u00e0 6.4.14", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions ant\u00e9rieures \u00e0 7.2.2", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 6.2.x ant\u00e9rieures \u00e0 6.2.12", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions ant\u00e9rieures \u00e0 7.0.12", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNDR versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiNDR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 2.0.x ant\u00e9rieures \u00e0 2.0.15", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR versions 7.3.x ant\u00e9rieures \u00e0 7.3.3", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientLinux versions ant\u00e9rieures \u00e0 7.4.0", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSIEM versions ant\u00e9rieures \u00e0 7.1.6", "product": { "name": "FortiSIEM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions ant\u00e9rieures \u00e0 4.0.5", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-W2 versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiAP-W2", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions 4.2.x ant\u00e9rieures \u00e0 4.2.7", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 6.2.x ant\u00e9rieures \u00e0 6.2.4", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.4.x ant\u00e9rieures \u00e0 7.4.6", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitch versions 7.0.x ant\u00e9rieures \u00e0 7.0.8", "product": { "name": "FortiSwitch", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiTester versions ant\u00e9rieures \u00e0 7.2.1", "product": { "name": "FortiTester", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 6.4.x ant\u00e9rieures \u00e0 6.4.15", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAuthenticator versions 6.4.x ant\u00e9rieures \u00e0 6.4.1", "product": { "name": "FortiAuthenticator", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiVoice versions ant\u00e9rieures \u00e0 6.4.10", "product": { "name": "FortiVoice", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.2.x ant\u00e9rieures \u00e0 7.2.12", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR versions 7.5.x ant\u00e9rieures \u00e0 7.5.1", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiRecorder versions 7.2.x ant\u00e9rieures \u00e0 7.2.2", "product": { "name": "FortiRecorder", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 7.0.x ant\u00e9rieures \u00e0 7.0.7", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-45326", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45326" }, { "name": "CVE-2023-37931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37931" }, { "name": "CVE-2024-32115", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32115" }, { "name": "CVE-2023-42786", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42786" }, { "name": "CVE-2024-35280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35280" }, { "name": "CVE-2024-35273", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35273" }, { "name": "CVE-2024-48884", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48884" }, { "name": "CVE-2024-46666", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46666" }, { "name": "CVE-2022-23439", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23439" }, { "name": "CVE-2024-47571", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47571" }, { "name": "CVE-2024-35275", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35275" }, { "name": "CVE-2024-47573", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47573" }, { "name": "CVE-2024-52963", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52963" }, { "name": "CVE-2023-37937", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37937" }, { "name": "CVE-2024-33503", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33503" }, { "name": "CVE-2024-55593", "url": "https://www.cve.org/CVERecord?id=CVE-2024-55593" }, { "name": "CVE-2024-48885", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48885" }, { "name": "CVE-2024-46662", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46662" }, { "name": "CVE-2024-27778", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27778" }, { "name": "CVE-2024-48893", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48893" }, { "name": "CVE-2024-47566", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47566" }, { "name": "CVE-2024-52969", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52969" }, { "name": "CVE-2024-35276", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35276" }, { "name": "CVE-2024-40587", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40587" }, { "name": "CVE-2024-36512", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36512" }, { "name": "CVE-2023-46715", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46715" }, { "name": "CVE-2024-36510", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36510" }, { "name": "CVE-2024-56497", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56497" }, { "name": "CVE-2024-46665", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46665" }, { "name": "CVE-2024-48890", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48890" }, { "name": "CVE-2024-21758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21758" }, { "name": "CVE-2024-52967", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52967" }, { "name": "CVE-2023-37936", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37936" }, { "name": "CVE-2024-46668", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46668" }, { "name": "CVE-2024-35278", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35278" }, { "name": "CVE-2024-26012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26012" }, { "name": "CVE-2024-46664", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46664" }, { "name": "CVE-2024-23106", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23106" }, { "name": "CVE-2024-54021", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54021" }, { "name": "CVE-2024-46669", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46669" }, { "name": "CVE-2023-5217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5217" }, { "name": "CVE-2023-42785", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42785" }, { "name": "CVE-2024-36504", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36504" }, { "name": "CVE-2024-35277", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35277" }, { "name": "CVE-2023-4863", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863" }, { "name": "CVE-2024-48886", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48886" }, { "name": "CVE-2024-50564", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50564" }, { "name": "CVE-2024-33502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33502" }, { "name": "CVE-2024-45331", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45331" }, { "name": "CVE-2024-50563", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50563" }, { "name": "CVE-2024-36506", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36506" }, { "name": "CVE-2024-46667", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46667" }, { "name": "CVE-2024-46670", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46670" }, { "name": "CVE-2024-47572", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47572" } ], "initial_release_date": "2025-01-15T00:00:00", "last_revision_date": "2025-01-15T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0031", "revisions": [ { "description": "Version initiale", "revision_date": "2025-01-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-258", "url": "https://www.fortiguard.com/psirt/FG-IR-23-258" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-458", "url": "https://www.fortiguard.com/psirt/FG-IR-23-458" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-061", "url": "https://www.fortiguard.com/psirt/FG-IR-24-061" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-405", "url": "https://www.fortiguard.com/psirt/FG-IR-23-405" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-285", "url": "https://www.fortiguard.com/psirt/FG-IR-24-285" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-165", "url": "https://www.fortiguard.com/psirt/FG-IR-24-165" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-494", "url": "https://www.fortiguard.com/psirt/FG-IR-23-494" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-220", "url": "https://www.fortiguard.com/psirt/FG-IR-23-220" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-221", "url": "https://www.fortiguard.com/psirt/FG-IR-24-221" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-078", "url": "https://www.fortiguard.com/psirt/FG-IR-24-078" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-282", "url": "https://www.fortiguard.com/psirt/FG-IR-24-282" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-373", "url": "https://www.fortiguard.com/psirt/FG-IR-24-373" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-106", "url": "https://www.fortiguard.com/psirt/FG-IR-24-106" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-250", "url": "https://www.fortiguard.com/psirt/FG-IR-24-250" }, { "published_at": "2025-01-15", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-189", "url": "https://www.fortiguard.com/psirt/FG-IR-23-189" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-401", "url": "https://www.fortiguard.com/psirt/FG-IR-24-401" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-239", "url": "https://www.fortiguard.com/psirt/FG-IR-24-239" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-097", "url": "https://www.fortiguard.com/psirt/FG-IR-24-097" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-260", "url": "https://www.fortiguard.com/psirt/FG-IR-23-260" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-170", "url": "https://www.fortiguard.com/psirt/FG-IR-23-170" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-259", "url": "https://www.fortiguard.com/psirt/FG-IR-24-259" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-143", "url": "https://www.fortiguard.com/psirt/FG-IR-24-143" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-476", "url": "https://www.fortiguard.com/psirt/FG-IR-23-476" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-415", "url": "https://www.fortiguard.com/psirt/FG-IR-24-415" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-461", "url": "https://www.fortiguard.com/psirt/FG-IR-23-461" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-266", "url": "https://www.fortiguard.com/psirt/FG-IR-24-266" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-407", "url": "https://www.fortiguard.com/psirt/FG-IR-23-407" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-086", "url": "https://www.fortiguard.com/psirt/FG-IR-24-086" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-465", "url": "https://www.fortiguard.com/psirt/FG-IR-24-465" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-222", "url": "https://www.fortiguard.com/psirt/FG-IR-24-222" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-219", "url": "https://www.fortiguard.com/psirt/FG-IR-24-219" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-210", "url": "https://www.fortiguard.com/psirt/FG-IR-24-210" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-211", "url": "https://www.fortiguard.com/psirt/FG-IR-24-211" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-267", "url": "https://www.fortiguard.com/psirt/FG-IR-24-267" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-010", "url": "https://www.fortiguard.com/psirt/FG-IR-24-010" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-473", "url": "https://www.fortiguard.com/psirt/FG-IR-23-473" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-216", "url": "https://www.fortiguard.com/psirt/FG-IR-24-216" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-326", "url": "https://www.fortiguard.com/psirt/FG-IR-24-326" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-135", "url": "https://www.fortiguard.com/psirt/FG-IR-24-135" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-152", "url": "https://www.fortiguard.com/psirt/FG-IR-24-152" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-304", "url": "https://www.fortiguard.com/psirt/FG-IR-24-304" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-164", "url": "https://www.fortiguard.com/psirt/FG-IR-24-164" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-310", "url": "https://www.fortiguard.com/psirt/FG-IR-24-310" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-405", "url": "https://www.fortiguard.com/psirt/FG-IR-24-405" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-127", "url": "https://www.fortiguard.com/psirt/FG-IR-24-127" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-381", "url": "https://www.fortiguard.com/psirt/FG-IR-23-381" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-091", "url": "https://www.fortiguard.com/psirt/FG-IR-24-091" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-417", "url": "https://www.fortiguard.com/psirt/FG-IR-24-417" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-293", "url": "https://www.fortiguard.com/psirt/FG-IR-23-293" }, { "published_at": "2025-01-14", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-071", "url": "https://www.fortiguard.com/psirt/FG-IR-24-071" } ] }
CERTFR-2024-AVI-1096
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que les correctifs concernant la vulnérabilité CVE-2024-50570 pour FortiClientLinux 7.0.14, 7.2.8 et 7.4.3 ne sont pas encore disponibles.
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiWLM | FortiWLM versions 8.6.x antérieures à 8.6.6 | ||
Fortinet | FortiClient | FortiClientWindows 7.4.x versions antérieures à 7.4.2 | ||
Fortinet | FortiManager | FortiManager versions 7.4.x antérieures à 7.4.5 | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.0.1 et antérieures à 7.0.13 | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.2.1 et antérieures à 7.2.8 | ||
Fortinet | FortiClient | FortiClientLinux 7.4.x versions antérieures à 7.4.3 | ||
Fortinet | FortiClient | FortiClientWindows 7.0.x versions antérieures à 7.0.14 | ||
Fortinet | FortiManager | FortiManager versions postérieures à 6.4.10 et antérieures à 6.4.15 | ||
Fortinet | FortiClient | FortiClientLinux 7.2.x versions antérieures à 7.2.8 | ||
Fortinet | FortiManager | FortiManager versions 7.6.x antérieures à 7.6.1 | ||
Fortinet | FortiWLM | FortiWLM versions 8.5.x antérieures à 8.5.5 | ||
Fortinet | FortiManager | FortiManager Cloud versions postérieures à 7.4.1 et antérieures à 7.4.5 | ||
Fortinet | FortiClient | FortiClientLinux 7.0.x versions antérieures à 7.0.14 | ||
Fortinet | FortiManager | FortiManager versions postérieures à 7.0.5 et antérieures à 7.0.13 | ||
Fortinet | FortiClient | FortiClientWindows 7.2.x versions antérieures à 7.2.7 | ||
Fortinet | FortiManager | FortiManager versions postérieures à 7.2.3 et antérieures à 7.2.8 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiWLM versions 8.6.x ant\u00e9rieures \u00e0 8.6.6", "product": { "name": "FortiWLM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows 7.4.x versions ant\u00e9rieures \u00e0 7.4.2", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.0.1 et ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.2.1 et ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientLinux 7.4.x versions ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows 7.0.x versions ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions post\u00e9rieures \u00e0 6.4.10 et ant\u00e9rieures \u00e0 6.4.15", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientLinux 7.2.x versions ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWLM versions 8.5.x ant\u00e9rieures \u00e0 8.5.5", "product": { "name": "FortiWLM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.4.1 et ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientLinux 7.0.x versions ant\u00e9rieures \u00e0 7.0.14", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions post\u00e9rieures \u00e0 7.0.5 et ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows 7.2.x versions ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions post\u00e9rieures \u00e0 7.2.3 et ant\u00e9rieures \u00e0 7.2.8", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "L\u0027\u00e9diteur indique que les correctifs concernant la vuln\u00e9rabilit\u00e9 CVE-2024-50570 pour FortiClientLinux 7.0.14, 7.2.8 et 7.4.3 ne sont pas encore disponibles.", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-34990", "url": "https://www.cve.org/CVERecord?id=CVE-2023-34990" }, { "name": "CVE-2024-50570", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50570" }, { "name": "CVE-2024-48889", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48889" } ], "initial_release_date": "2024-12-19T00:00:00", "last_revision_date": "2024-12-19T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1096", "revisions": [ { "description": "Version initiale", "revision_date": "2024-12-19T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2024-12-18", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-425", "url": "https://www.fortiguard.com/psirt/FG-IR-24-425" }, { "published_at": "2024-12-18", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-278", "url": "https://www.fortiguard.com/psirt/FG-IR-23-278" }, { "published_at": "2024-12-18", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-144", "url": "https://www.fortiguard.com/psirt/FG-IR-23-144" } ] }
CERTFR-2024-AVI-0979
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiProxy | FortiProxy versions 7.4.x antérieures à 7.4.4 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer-BigData versions antérieures à 7.4.1 | ||
Fortinet | FortiPortal | FortiPortal versions antérieures à 7.0.9 | ||
Fortinet | FortiWeb | FortiWeb versions antérieures à 7.4.4 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiManager | FortiManager Cloud toutes versions | ||
Fortinet | FortiProxy | FortiProxy versions antérieures à 7.2.10 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions antérieures à 7.2.7 | ||
Fortinet | FortiPAM | FortiPAM versions antérieures à 1.3 | ||
Fortinet | FortiSwitchManager | FortiSwitchManager versions 7.2.x antérieures à 7.2.4 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions antérieures à 7.4.3 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer Cloud versions 7.4.x antérieures à 7.4.3 | ||
Fortinet | FortiPortal | FortiPortal versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiManager | FortiManager versions antérieures à 7.4.3 | ||
Fortinet | FortiSwitchManager | FortiSwitchManager versions 7.0.x antérieures à 7.0.4 | ||
Fortinet | FortiOS | FortiOS versions 7.4.x antérieures à 7.4.4 | ||
Fortinet | FortiClient | FortiClientWindows versions antérieures à 7.0.13 | ||
Fortinet | FortiClient | FortiClientMac versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiClient | FortiClientMac versions 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 7.0.15 | ||
Fortinet | FortiOS | FortiOS versions 7.2.x antérieures à 7.2.9 | ||
Fortinet | FortiWeb | FortiWeb versions 7.6.x antérieures à 7.6.1 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiProxy versions 7.4.x ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer-BigData versions ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions ant\u00e9rieures \u00e0 7.0.9", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager Cloud toutes versions", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions ant\u00e9rieures \u00e0 7.2.10", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions ant\u00e9rieures \u00e0 7.2.7", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPAM versions ant\u00e9rieures \u00e0 1.3", "product": { "name": "FortiPAM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitchManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.4", "product": { "name": "FortiSwitchManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer Cloud versions 7.4.x ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPortal versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiPortal", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions ant\u00e9rieures \u00e0 7.4.3", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSwitchManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.4", "product": { "name": "FortiSwitchManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.4.x ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientMac versions 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 7.0.15", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.2.x ant\u00e9rieures \u00e0 7.2.9", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 7.6.x ant\u00e9rieures \u00e0 7.6.1", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-36509", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36509" }, { "name": "CVE-2023-47543", "url": "https://www.cve.org/CVERecord?id=CVE-2023-47543" }, { "name": "CVE-2024-26011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26011" }, { "name": "CVE-2024-33505", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33505" }, { "name": "CVE-2023-50176", "url": "https://www.cve.org/CVERecord?id=CVE-2023-50176" }, { "name": "CVE-2024-40592", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40592" }, { "name": "CVE-2024-31496", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31496" }, { "name": "CVE-2024-32117", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32117" }, { "name": "CVE-2023-44255", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44255" }, { "name": "CVE-2024-36507", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36507" }, { "name": "CVE-2024-36513", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36513" }, { "name": "CVE-2024-47574", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47574" }, { "name": "CVE-2024-23666", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23666" }, { "name": "CVE-2024-40590", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40590" }, { "name": "CVE-2024-32116", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32116" }, { "name": "CVE-2024-35274", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35274" }, { "name": "CVE-2024-32118", "url": "https://www.cve.org/CVERecord?id=CVE-2024-32118" }, { "name": "CVE-2024-33510", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33510" } ], "initial_release_date": "2024-11-13T00:00:00", "last_revision_date": "2024-11-13T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0979", "revisions": [ { "description": "Version initiale", "revision_date": "2024-11-13T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-396", "url": "https://www.fortiguard.com/psirt/FG-IR-23-396" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-022", "url": "https://www.fortiguard.com/psirt/FG-IR-24-022" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-115", "url": "https://www.fortiguard.com/psirt/FG-IR-24-115" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-033", "url": "https://www.fortiguard.com/psirt/FG-IR-24-033" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-116", "url": "https://www.fortiguard.com/psirt/FG-IR-24-116" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-180", "url": "https://www.fortiguard.com/psirt/FG-IR-24-180" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-199", "url": "https://www.fortiguard.com/psirt/FG-IR-24-199" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-475", "url": "https://www.fortiguard.com/psirt/FG-IR-23-475" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-144", "url": "https://www.fortiguard.com/psirt/FG-IR-24-144" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-125", "url": "https://www.fortiguard.com/psirt/FG-IR-24-125" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-179", "url": "https://www.fortiguard.com/psirt/FG-IR-24-179" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-099", "url": "https://www.fortiguard.com/psirt/FG-IR-24-099" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-267", "url": "https://www.fortiguard.com/psirt/FG-IR-23-267" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-155", "url": "https://www.fortiguard.com/psirt/FG-IR-22-155" }, { "published_at": "2024-11-13", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-205", "url": "https://www.fortiguard.com/psirt/FG-IR-24-205" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-032", "url": "https://www.fortiguard.com/psirt/FG-IR-24-032" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-448", "url": "https://www.fortiguard.com/psirt/FG-IR-23-448" }, { "published_at": "2024-11-12", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-098", "url": "https://www.fortiguard.com/psirt/FG-IR-24-098" } ] }
CERTFR-2024-AVI-0763
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClientMac versions antérieures à 7.2.5 | ||
Fortinet | FortiADC | FortiADC versions antérieures à 7.4.5 | ||
Fortinet | FortiSOAR | FortiSOAR versions 7.4.x antérieures à 7.4.4 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer-BigData versions antérieures à 7.2.6 | ||
Fortinet | FortiSandbox | FortiSandbox versions antérieures à 4.2.7 | ||
Fortinet | FortiClient | FortiClientWindows versions antérieures à 7.0.12 | ||
Fortinet | FortiClient | FortiClientEMS Cloud versions 7.0.x antérieures à 7.0.13 | ||
Fortinet | FortiClient | FortiClientEMS versions antérieures à 7.0.13 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiClient | FortiClientEMS Cloud versions 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiClient | FortiClientWindows versions 7.2.x antérieures à 7.2.3 | ||
Fortinet | FortiClient | FortiClientEMS versions 7.2.x antérieures à 7.2.5 | ||
Fortinet | FortiSandbox | FortiSandbox versions 4.4.x antérieures à 4.4.5 | ||
Fortinet | FortiManager | FortiManager versions antérieures à 7.2.5 | ||
Fortinet | FortiClient | FortiClientLinux versions antérieures à 7.2.5 | ||
Fortinet | FortiClient | FortiClientiOS versions antérieures à 7.4 | ||
Fortinet | FortiManager | FortiManager versions 7.4.x antérieures à 7.4.1 | ||
Fortinet | FortiClient | FortiClientAndroid versions antérieures à 7.2.1 | ||
Fortinet | FortiSOAR | FortiSOAR versions antérieures à 7.3.3 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer-BigData versions 7.4.x antérieures à 7.4.0 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions antérieures à 7.2.5 | ||
Fortinet | FortiEDR Manager | FortiEDR Manager versions antérieures à 6.2.3 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClientMac versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions ant\u00e9rieures \u00e0 7.4.5", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR versions 7.4.x ant\u00e9rieures \u00e0 7.4.4", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer-BigData versions ant\u00e9rieures \u00e0 7.2.6", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions ant\u00e9rieures \u00e0 4.2.7", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions ant\u00e9rieures \u00e0 7.0.12", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS Cloud versions 7.0.x ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions ant\u00e9rieures \u00e0 7.0.13", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS Cloud versions 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientWindows versions 7.2.x ant\u00e9rieures \u00e0 7.2.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions 7.2.x ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions 4.4.x ant\u00e9rieures \u00e0 4.4.5", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientLinux versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientiOS versions ant\u00e9rieures \u00e0 7.4", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.1", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientAndroid versions ant\u00e9rieures \u00e0 7.2.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSOAR versions ant\u00e9rieures \u00e0 7.3.3", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer-BigData versions 7.4.x ant\u00e9rieures \u00e0 7.4.0", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions ant\u00e9rieures \u00e0 7.2.5", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiEDR Manager versions ant\u00e9rieures \u00e0 6.2.3", "product": { "name": "FortiEDR Manager", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-44254", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44254" }, { "name": "CVE-2024-35282", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35282" }, { "name": "CVE-2024-31490", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31490" }, { "name": "CVE-2024-45323", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45323" }, { "name": "CVE-2024-36511", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36511" }, { "name": "CVE-2024-33508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33508" }, { "name": "CVE-2022-45856", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45856" }, { "name": "CVE-2024-31489", "url": "https://www.cve.org/CVERecord?id=CVE-2024-31489" }, { "name": "CVE-2024-21753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-21753" }, { "name": "CVE-2024-4863", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4863" } ], "initial_release_date": "2024-09-11T00:00:00", "last_revision_date": "2024-09-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0763", "revisions": [ { "description": "Version initiale", "revision_date": "2024-09-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-282", "url": "https://www.fortiguard.com/psirt/FG-IR-22-282" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-123", "url": "https://www.fortiguard.com/psirt/FG-IR-24-123" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-256", "url": "https://www.fortiguard.com/psirt/FG-IR-22-256" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-139", "url": "https://www.fortiguard.com/psirt/FG-IR-24-139" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-051", "url": "https://www.fortiguard.com/psirt/FG-IR-24-051" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-204", "url": "https://www.fortiguard.com/psirt/FG-IR-23-204" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-371", "url": "https://www.fortiguard.com/psirt/FG-IR-24-371" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-230", "url": "https://www.fortiguard.com/psirt/FG-IR-22-230" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-362", "url": "https://www.fortiguard.com/psirt/FG-IR-23-362" }, { "published_at": "2024-09-10", "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-048", "url": "https://www.fortiguard.com/psirt/FG-IR-24-048" } ] }
CERTFR-2022-AVI-410
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiNAC | Fortinet FortiNAC versions 9.2.x antérieures à 9.2.3 | ||
Fortinet | FortiNAC | Fortinet FortiNAC versions 9.4.x antérieures à 9.4.0 | ||
Fortinet | FortiGate | Fortinet FortiGate versions 7.0.x antérieures à 7.0.4 | ||
Fortinet | N/A | Fortinet FortiIsolator versions antérieures à 2.3.3 ou 2.4.0 | ||
Fortinet | FortiProxy | Fortinet FortiProxy versions 2.0.x antérieures à 2.0.8 | ||
Fortinet | FortiClient | Fortinet FortiClient versions antérieures à 6.4.7 | ||
Fortinet | FortiSOAR | Fortinet FortiSOAR versions antérieures à 7.2.0 | ||
Fortinet | FortiProxy | Fortinet FortiProxy versions 7.0.x antérieures à 7.0.2 | ||
Fortinet | FortiClient | Fortinet FortiClient versions 7.x antérieures à 7.0.3 | ||
Fortinet | N/A | Fortinet FortiFone versions antérieures à 3.0.12 | ||
Fortinet | FortiGate | Fortinet FortiGate versions antérieures à 6.4.9 | ||
Fortinet | FortiNAC | Fortinet FortiNAC versions 10.x antérieures à 10.0.0 | ||
Fortinet | FortiOS | Fortinet FortiOS versions antérieures à 6.4.9 | ||
Fortinet | FortiNAC | Fortinet FortiNAC versions antérieures à 9.1.6 | ||
Fortinet | FortiOS | Fortinet FortiOS versions 7.0.x antérieures à 7.0.4 ou 7.2.0 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Fortinet FortiNAC versions 9.2.x ant\u00e9rieures \u00e0 9.2.3", "product": { "name": "FortiNAC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiNAC versions 9.4.x ant\u00e9rieures \u00e0 9.4.0", "product": { "name": "FortiNAC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiGate versions 7.0.x ant\u00e9rieures \u00e0 7.0.4", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiIsolator versions ant\u00e9rieures \u00e0 2.3.3 ou 2.4.0", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiProxy versions 2.0.x ant\u00e9rieures \u00e0 2.0.8", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiClient versions ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiSOAR versions ant\u00e9rieures \u00e0 7.2.0", "product": { "name": "FortiSOAR", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiProxy versions 7.0.x ant\u00e9rieures \u00e0 7.0.2", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiClient versions 7.x ant\u00e9rieures \u00e0 7.0.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiFone versions ant\u00e9rieures \u00e0 3.0.12", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiGate versions ant\u00e9rieures \u00e0 6.4.9", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiNAC versions 10.x ant\u00e9rieures \u00e0 10.0.0", "product": { "name": "FortiNAC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiOS versions ant\u00e9rieures \u00e0 6.4.9", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiNAC versions ant\u00e9rieures \u00e0 9.1.6", "product": { "name": "FortiNAC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Fortinet FortiOS versions 7.0.x ant\u00e9rieures \u00e0 7.0.4 ou 7.2.0", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-43845", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43845" }, { "name": "CVE-2021-21375", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21375" }, { "name": "CVE-2020-15260", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15260" }, { "name": "CVE-2021-37706", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37706" }, { "name": "CVE-2022-26116", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26116" }, { "name": "CVE-2021-43081", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43081" }, { "name": "CVE-2022-23443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23443" }, { "name": "CVE-2021-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43804" }, { "name": "CVE-2021-43066", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43066" }, { "name": "CVE-2021-32686", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32686" }, { "name": "CVE-2022-22306", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22306" }, { "name": "CVE-2021-41020", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41020" }, { "name": "CVE-2021-43206", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43206" }, { "name": "CVE-2021-41032", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41032" } ], "initial_release_date": "2022-05-04T00:00:00", "last_revision_date": "2022-05-04T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-410", "revisions": [ { "description": "Version initiale", "revision_date": "2022-05-04T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-062 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-22-062" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-231 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-231" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-041 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-22-041" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-147 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-147" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-040 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-040" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-230 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-230" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-239 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-239" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-154 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-154" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-007 du 03 mai 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-22-007" } ] }
CERTFR-2022-AVI-312
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Linux et Windows versions 6.x antérieures à 6.4.8 | ||
Fortinet | N/A | FortiEDR versions antérieures à 5.0.3 | ||
Fortinet | FortiClient | FortiClient pour Linux et Windows versions 7.x antérieures à 7.0.3 | ||
Fortinet | FortiWAN | FortiWAN versions antérieures à 4.5.9 | ||
Fortinet | N/A | FortiWLC versions antérieures à 8.6.3 | ||
Fortinet | N/A | FortiEDR Collector versions antérieures à 5.0.3 b0508 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Linux et Windows versions 6.x ant\u00e9rieures \u00e0 6.4.8", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiEDR versions ant\u00e9rieures \u00e0 5.0.3", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Linux et Windows versions 7.x ant\u00e9rieures \u00e0 7.0.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWAN versions ant\u00e9rieures \u00e0 4.5.9", "product": { "name": "FortiWAN", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWLC versions ant\u00e9rieures \u00e0 8.6.3", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiEDR Collector versions ant\u00e9rieures \u00e0 5.0.3 b0508", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-26113", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26113" }, { "name": "CVE-2021-24009", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24009" }, { "name": "CVE-2021-26114", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26114" }, { "name": "CVE-2021-44167", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44167" }, { "name": "CVE-2022-23441", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23441" }, { "name": "CVE-2021-32585", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32585" }, { "name": "CVE-2022-23446", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23446" }, { "name": "CVE-2021-32593", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32593" }, { "name": "CVE-2021-44169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44169" }, { "name": "CVE-2021-26112", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26112" }, { "name": "CVE-2022-23440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23440" }, { "name": "CVE-2021-43205", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43205" } ], "initial_release_date": "2022-04-06T00:00:00", "last_revision_date": "2022-04-06T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-312", "revisions": [ { "description": "Version initiale", "revision_date": "2022-04-06T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement\nde la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-018 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-22-018" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-078 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-078" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-060 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-060" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-226 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-226" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-064 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-064" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-070 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-070" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-232 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-232" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-238 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-238" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-065 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-065" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-052 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-22-052" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-22-019 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-22-019" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-002 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-002" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-062 du 05 avril 2022", "url": "https://www.fortiguard.com/psirt/FG-IR-21-062" } ] }
CERTFR-2021-AVI-927
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à l'intégrité des données, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiGate | FortiGate versions 7.0.x antérieures à 7.0.2 | ||
Fortinet | FortiClient | FortiClient pour Linux, Mac et Windows versions 7.0.x antérieures à 7.0.2 | ||
Fortinet | FortiGate | FortiGate versions 6.4.x antérieures à 6.4.7 | ||
Fortinet | FortiProxy | FortiProxy versions 1.x antérieures à 1.2.12 | ||
Fortinet | FortiOS | FortiOS versions 6.2.x antérieures à 6.2.10 | ||
Fortinet | FortiNAC | FortiNAC versions 8.8.x antérieures à 8.8.10 | ||
Fortinet | FortiWeb | FortiWeb versions 6.4.x antérieures à 6.4.2 | ||
Fortinet | FortiOS | FortiOS versions 7.0.x antérieures à 7.0.3 | ||
Fortinet | FortiADC | FortiADC versions 6.1.x antérieures à 6.1.4 | ||
Fortinet | FortiWeb | FortiWeb versions 6.2.x antérieures à 6.2.6 | ||
Fortinet | FortiSandbox | FortiSandbox versions 3.x antérieures à 3.2.3 | ||
Fortinet | FortiGate | FortiGate versions 6.2.x antérieures à 6.2.10 | ||
Fortinet | FortiOS | FortiOS versions 5.6.x antérieures à 5.6.14 | ||
Fortinet | FortiOS | FortiOS versions 6.4.x antérieures à 6.4.8 | ||
Fortinet | FortiOS | FortiOS versions 6.0.x antérieures à 6.0.14 | ||
Fortinet | FortiADC | FortiADC version 6.2.x antérieures à 6.2.1 | ||
Fortinet | FortiClient | FortiClient pour Linux, Mac et Windows versions 6.4.x antérieures à 6.4.7 | ||
Fortinet | FortiProxy | FortiProxy versions 2.x antérieures à 2.0.4 | ||
Fortinet | FortiWeb | FortiWeb versions 6.3.x antérieures à 6.3.16 | ||
Fortinet | FortiOS | FortiOS-6K7K versions 6.4.x antérieures à 6.4.3 | ||
Fortinet | FortiSandbox | FortiSandbox versions 4.x antérieures à 4.0.1 | ||
Fortinet | FortiClientEMS | FortiClientEMS versions 7.0.x antérieures à 7.0.2 | ||
Fortinet | FortiClientEMS | FortiClientEMS versions 6.4.x antérieures à 6.4.7 | ||
Fortinet | N/A | Meru AP versions antérieures à 8.6.2 | ||
Fortinet | FortiProxy | FortiProxy versions 7.x antérieures à 7.0.1 | ||
Fortinet | N/A | FortiWLC versions antérieures à 8.6.2 | ||
Fortinet | FortiNAC | FortiNAC versions 9.2.x antérieures à 9.2.1 | ||
Fortinet | FortiNAC | FortiNAC versions 9.1.x antérieures à 9.1.4 | ||
Fortinet | N/A | FortiAuthenticator versions antérieures à 6.4.1 | ||
Fortinet | FortiOS | FortiOS-6K7K versions 6.2.x antérieures à 6.2.8 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiGate versions 7.0.x ant\u00e9rieures \u00e0 7.0.2", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Linux, Mac et Windows versions 7.0.x ant\u00e9rieures \u00e0 7.0.2", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiGate versions 6.4.x ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 1.x ant\u00e9rieures \u00e0 1.2.12", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 6.2.x ant\u00e9rieures \u00e0 6.2.10", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNAC versions 8.8.x ant\u00e9rieures \u00e0 8.8.10", "product": { "name": "FortiNAC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.4.x ant\u00e9rieures \u00e0 6.4.2", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.0.x ant\u00e9rieures \u00e0 7.0.3", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions 6.1.x ant\u00e9rieures \u00e0 6.1.4", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.2.x ant\u00e9rieures \u00e0 6.2.6", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions 3.x ant\u00e9rieures \u00e0 3.2.3", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiGate versions 6.2.x ant\u00e9rieures \u00e0 6.2.10", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 5.6.x ant\u00e9rieures \u00e0 5.6.14", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 6.4.x ant\u00e9rieures \u00e0 6.4.8", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 6.0.x ant\u00e9rieures \u00e0 6.0.14", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC version 6.2.x ant\u00e9rieures \u00e0 6.2.1", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Linux, Mac et Windows versions 6.4.x ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 2.x ant\u00e9rieures \u00e0 2.0.4", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.3.x ant\u00e9rieures \u00e0 6.3.16", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS-6K7K versions 6.4.x ant\u00e9rieures \u00e0 6.4.3", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions 4.x ant\u00e9rieures \u00e0 4.0.1", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions 7.0.x ant\u00e9rieures \u00e0 7.0.2", "product": { "name": "FortiClientEMS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClientEMS versions 6.4.x ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiClientEMS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "Meru AP versions ant\u00e9rieures \u00e0 8.6.2", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiProxy versions 7.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "FortiProxy", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWLC versions ant\u00e9rieures \u00e0 8.6.2", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNAC versions 9.2.x ant\u00e9rieures \u00e0 9.2.1", "product": { "name": "FortiNAC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiNAC versions 9.1.x ant\u00e9rieures \u00e0 9.1.4", "product": { "name": "FortiNAC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAuthenticator versions ant\u00e9rieures \u00e0 6.4.1", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS-6K7K versions 6.2.x ant\u00e9rieures \u00e0 6.2.8", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-43068", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43068" }, { "name": "CVE-2021-44168", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44168" }, { "name": "CVE-2021-36194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36194" }, { "name": "CVE-2021-41028", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41028" }, { "name": "CVE-2021-36195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36195" }, { "name": "CVE-2021-41014", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41014" }, { "name": "CVE-2021-41030", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41030" }, { "name": "CVE-2021-43067", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43067" }, { "name": "CVE-2021-41017", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41017" }, { "name": "CVE-2021-43064", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43064" }, { "name": "CVE-2021-41021", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41021" }, { "name": "CVE-2021-42759", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42759" }, { "name": "CVE-2021-43071", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43071" }, { "name": "CVE-2021-36173", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36173" }, { "name": "CVE-2021-41024", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41024" }, { "name": "CVE-2021-42752", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42752" }, { "name": "CVE-2021-41025", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41025" }, { "name": "CVE-2021-41015", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41015" }, { "name": "CVE-2021-43065", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43065" }, { "name": "CVE-2021-26110", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26110" }, { "name": "CVE-2021-41013", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41013" }, { "name": "CVE-2021-26108", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26108" }, { "name": "CVE-2021-43204", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43204" }, { "name": "CVE-2021-42758", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42758" }, { "name": "CVE-2021-41029", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41029" }, { "name": "CVE-2021-42760", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42760" }, { "name": "CVE-2021-41026", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41026" }, { "name": "CVE-2021-41027", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41027" }, { "name": "CVE-2021-36189", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36189" }, { "name": "CVE-2021-36180", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36180" }, { "name": "CVE-2021-36191", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36191" }, { "name": "CVE-2021-42757", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42757" }, { "name": "CVE-2021-32591", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32591" }, { "name": "CVE-2021-36190", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36190" }, { "name": "CVE-2021-26109", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26109" }, { "name": "CVE-2021-26103", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26103" }, { "name": "CVE-2021-36167", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36167" }, { "name": "CVE-2021-43063", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43063" }, { "name": "CVE-2021-36188", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36188" } ], "initial_release_date": "2021-12-08T00:00:00", "last_revision_date": "2021-12-08T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-927", "revisions": [ { "description": "Version initiale", "revision_date": "2021-12-08T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9\ndes donn\u00e9es, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un\ncontournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-201 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-201" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-130 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-130" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-134 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-134" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-049 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-049" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-075 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-075" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-122 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-122" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-140 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-140" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-051 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-051" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-192 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-192" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-138 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-138" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-152 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-152" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-127 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-127" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-120 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-120" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-222 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-222" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-118 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-118" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-212 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-212" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-133 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-133" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-131 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-131" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-173 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-173" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-182 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-182" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-114 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-114" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-111 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-111" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-115 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-115" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-123 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-123" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-181 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-181" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-160 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-160" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-129 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-129" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-200 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-200" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-167 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-167" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-157 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-157" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-139 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-139" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-168 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-168" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-156 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-156" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-188 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-188" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-158 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-158" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-178 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-178" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-131 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-131" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-004 du 8 d\u00e9cembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-004" } ] }
CERTFR-2021-AVI-910
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Fortinet FortiClient. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient EMS versions 7.x antérieures à 7.0.1 | ||
Fortinet | FortiClient | FortiClient versions 6.x antérieures à 6.4.7 | ||
Fortinet | FortiClient | FortiClient EMS versions 6.x antérieures à 6.4.7 | ||
Fortinet | FortiClient | FortiClient versions 7.x antérieures à 7.0.1 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient EMS versions 7.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient versions 6.x ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient EMS versions 6.x ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient versions 7.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-32592", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32592" } ], "initial_release_date": "2021-11-30T00:00:00", "last_revision_date": "2021-12-07T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-910", "revisions": [ { "description": "Version initiale", "revision_date": "2021-11-30T00:00:00.000000" }, { "description": "correction de l\u0027impact, la vuln\u00e9rabilit\u00e9 permet une \u00e9l\u00e9vation de privil\u00e8ges.", "revision_date": "2021-12-07T00:00:00.000000" } ], "risks": [ { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Fortinet FortiClient. Elle\npermet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Fortinet FortiClient", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-088 du 29 novembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-088" } ] }
CERTFR-2021-AVI-685
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | N/A | FortiAuthenticator versions antérieures à 6.3.1 | ||
Fortinet | FortiSandbox | FortiSandbox versions antérieures à 3.2.2 | ||
Fortinet | FortiManager | FortiManager versions 6.4.x antérieures à 6.4.4 | ||
Fortinet | FortiWeb | FortiWeb versions antérieures à 6.2.5 | ||
Fortinet | FortiManager | FortiManager versions antérieures à 6.2.8 | ||
Fortinet | FortiGate | FortiGate versions 7.0.x antérieures à 7.0.1 | ||
Fortinet | FortiClient | FortiClient pour Linux versions 6.4.x antérieures à 6.4.3 | ||
Fortinet | FortiGate | FortiGate versions antérieures à 6.4.7 | ||
Fortinet | FortiWeb | FortiWeb versions 6.3.x antérieures à 6.3.15 | ||
Fortinet | FortiOS | FortiOS versions 7.0.x antérieures à 7.0.1 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 6.4.7 | ||
Fortinet | FortiClient | FortiClient pour Linux versions antérieures à 6.2.9 | ||
Fortinet | FortiWeb | FortiWeb versions 6.4.x antérieures à 6.4.1 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiAuthenticator versions ant\u00e9rieures \u00e0 6.3.1", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSandbox versions ant\u00e9rieures \u00e0 3.2.2", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 6.4.x ant\u00e9rieures \u00e0 6.4.4", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions ant\u00e9rieures \u00e0 6.2.5", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions ant\u00e9rieures \u00e0 6.2.8", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiGate versions 7.0.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Linux versions 6.4.x ant\u00e9rieures \u00e0 6.4.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiGate versions ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.3.x ant\u00e9rieures \u00e0 6.3.15", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 7.0.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 6.4.7", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Linux versions ant\u00e9rieures \u00e0 6.2.9", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.4.x ant\u00e9rieures \u00e0 6.4.1", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-36179", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36179" }, { "name": "CVE-2019-17655", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17655" }, { "name": "CVE-2021-36169", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36169" }, { "name": "CVE-2020-29012", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29012" }, { "name": "CVE-2021-24016", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24016" }, { "name": "CVE-2021-32600", "url": "https://www.cve.org/CVERecord?id=CVE-2021-32600" }, { "name": "CVE-2021-36182", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36182" }, { "name": "CVE-2021-26116", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26116" }, { "name": "CVE-2021-22123", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22123" }, { "name": "CVE-2021-24017", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24017" }, { "name": "CVE-2021-22127", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22127" }, { "name": "CVE-2020-29013", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29013" } ], "initial_release_date": "2021-09-08T00:00:00", "last_revision_date": "2021-09-08T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-685", "revisions": [ { "description": "Version initiale", "revision_date": "2021-09-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-091 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-091" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-116 du 18 ao\u00fbt 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-116" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-189 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-189" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-178 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-178" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-206 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-206" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-068 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-068" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-190 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-190" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-047 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-047" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-241 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-241" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-217 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-19-217" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-243 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-243" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-070 du 07 septembre 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-070" } ] }
CERTFR-2021-AVI-510
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiSandbox | FortiSandbox versions antérieures à 3.2.2 | ||
Fortinet | N/A | FSSO DC Agent and Collector avec FOS versions antérieures à 6.4.6 | ||
Fortinet | N/A | FortiAP-S versions 6.4.x antérieures à 6.4.6 | ||
Fortinet | FortiMail | FortiMail versions 5.4.x (Fortinet n'indique pas si un correctif sera disponible pour les vulnérabilités CVE-2021-24007, CVE-2021-22129, CVE-2021-24013 et CVE-2021-24015) | ||
Fortinet | FortiManager | FortiManager versions antérieures à 6.2.8 | ||
Fortinet | N/A | FSSO DC Agent and Collector avec FOS versions 7.0.x antérieures à 7.0.1 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions antérieures à 6.2.8 | ||
Fortinet | N/A | FortiAP-W2 versions 6.2.x antérieures à 6.2.6 | ||
Fortinet | N/A | FortiAP-S versions 6.2.x antérieures à 6.2.6 | ||
Fortinet | FortiManager | FortiManager versions 6.4.x antérieures à 6.4.6 | ||
Fortinet | N/A | FortiAP versions 6.4.x antérieures à 6.4.6 | ||
Fortinet | FortiClient | FortiClient pour MacOS versions antérieures à 6.4.4 | ||
Fortinet | FortiMail | FortiMail versions 6.4.x antérieures à 6.4.5 (Fortinet n'indique pas si un correctif sera disponible pour la vulnérabilité CVE-2021-26099) | ||
Fortinet | FortiMail | FortiMail versions 6.2.x antérieures à 6.2.7 | ||
Fortinet | FortiAnalyzer | FortiAnalyzer versions 6.4.x antérieures à 6.4.6 | ||
Fortinet | FortiMail | FortiMail versions 6.0.x antérieures à 6.0.11 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiSandbox versions ant\u00e9rieures \u00e0 3.2.2", "product": { "name": "FortiSandbox", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FSSO DC Agent and Collector avec FOS versions ant\u00e9rieures \u00e0 6.4.6", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-S versions 6.4.x ant\u00e9rieures \u00e0 6.4.6", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 5.4.x (Fortinet n\u0027indique pas si un correctif sera disponible pour les vuln\u00e9rabilit\u00e9s CVE-2021-24007, CVE-2021-22129, CVE-2021-24013 et CVE-2021-24015)", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions ant\u00e9rieures \u00e0 6.2.8", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FSSO DC Agent and Collector avec FOS versions 7.0.x ant\u00e9rieures \u00e0 7.0.1", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions ant\u00e9rieures \u00e0 6.2.8", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-W2 versions 6.2.x ant\u00e9rieures \u00e0 6.2.6", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-S versions 6.2.x ant\u00e9rieures \u00e0 6.2.6", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 6.4.x ant\u00e9rieures \u00e0 6.4.6", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP versions 6.4.x ant\u00e9rieures \u00e0 6.4.6", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour MacOS versions ant\u00e9rieures \u00e0 6.4.4", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 6.4.x ant\u00e9rieures \u00e0 6.4.5 (Fortinet n\u0027indique pas si un correctif sera disponible pour la vuln\u00e9rabilit\u00e9 CVE-2021-26099)", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 6.2.x ant\u00e9rieures \u00e0 6.2.7", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAnalyzer versions 6.4.x ant\u00e9rieures \u00e0 6.4.6", "product": { "name": "FortiAnalyzer", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiMail versions 6.0.x ant\u00e9rieures \u00e0 6.0.11", "product": { "name": "FortiMail", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-26095", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26095" }, { "name": "CVE-2021-24015", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24015" }, { "name": "CVE-2021-26100", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26100" }, { "name": "CVE-2021-26088", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26088" }, { "name": "CVE-2021-26106", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26106" }, { "name": "CVE-2021-24007", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24007" }, { "name": "CVE-2021-26089", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26089" }, { "name": "CVE-2021-26091", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26091" }, { "name": "CVE-2021-22129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22129" }, { "name": "CVE-2021-24013", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24013" }, { "name": "CVE-2021-24020", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24020" }, { "name": "CVE-2021-24022", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24022" }, { "name": "CVE-2021-22125", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22125" }, { "name": "CVE-2021-26099", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26099" }, { "name": "CVE-2021-26090", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26090" } ], "initial_release_date": "2021-07-08T00:00:00", "last_revision_date": "2021-07-08T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-510", "revisions": [ { "description": "Version initiale", "revision_date": "2021-07-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-244 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-244" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-194 du 30 juin 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-194" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-191 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-191" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-027 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-027" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-042 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-042" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-022 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-022" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-003 du 02 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-003" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-023 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-023" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-012 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-012" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-019 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-019" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-031 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-031" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-005 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-005" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-021 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-021" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-21-014 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-21-014" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-210 du 07 juillet 2021", "url": "https://www.fortiguard.com/psirt/FG-IR-20-210" } ] }
CERTFR-2020-AVI-788
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiGate | FortiGate version 6.4.x antérieures à 6.4.2 | ||
Fortinet | FortiClient | FortiClient versions 6.2 fonctionnant avec l'antivirus en version 6.x antérieures à 6.00137 | ||
Fortinet | FortiOS | FortiOS versions 6.4 fonctionnant avec l'antivirus en version 6.x antérieures à 6.00144 | ||
Fortinet | FortiGate | FortiGate version 6.2.x antérieures à 6.2.6 | ||
Fortinet | FortiOS | FortiOS versions 6.2 fonctionnant avec l'antivirus en version 6.x antérieures à 6.00145 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiGate version 6.4.x ant\u00e9rieures \u00e0 6.4.2", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient versions 6.2 fonctionnant avec l\u0027antivirus en version 6.x ant\u00e9rieures \u00e0 6.00137", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 6.4 fonctionnant avec l\u0027antivirus en version 6.x ant\u00e9rieures \u00e0 6.00144", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiGate version 6.2.x ant\u00e9rieures \u00e0 6.2.6", "product": { "name": "FortiGate", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions 6.2 fonctionnant avec l\u0027antivirus en version 6.x ant\u00e9rieures \u00e0 6.00145", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-9295", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9295" }, { "name": "CVE-2020-15937", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15937" } ], "initial_release_date": "2020-12-02T00:00:00", "last_revision_date": "2020-12-02T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-788", "revisions": [ { "description": "Version initiale", "revision_date": "2020-12-02T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Elles permettent \u00e0 un attaquant de provoquer un contournement\nde la politique de s\u00e9curit\u00e9 et une injection de code indirecte \u00e0\ndistance (XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-037 du 2 d\u00e9cembre 2020", "url": "https://www.fortiguard.com/psirt/FG-IR-20-037" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-068 du 2 d\u00e9cembre 2020", "url": "https://www.fortiguard.com/psirt/FG-IR-20-068" } ] }
CERTFR-2020-AVI-684
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Linux versions antérieures à 6.4.1 | ||
Fortinet | FortiOS | FortiOS version antérieures à 6.4.0 | ||
Fortinet | FortiClient | FortiClient pour Linux versions antérieures à 6.2.8 | ||
Fortinet | FortiOS | FortiOS version antérieures à 6.2.5 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Linux versions ant\u00e9rieures \u00e0 6.4.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS version ant\u00e9rieures \u00e0 6.4.0", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Linux versions ant\u00e9rieures \u00e0 6.2.8", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS version ant\u00e9rieures \u00e0 6.2.5", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-15934", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15934" }, { "name": "CVE-2020-6648", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6648" } ], "initial_release_date": "2020-10-28T00:00:00", "last_revision_date": "2020-10-28T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-684", "revisions": [ { "description": "Version initiale", "revision_date": "2020-10-28T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-009 du 19 octobre 2020", "url": "https://www.fortiguard.com/psirt/FG-IR-20-009" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-110 du 19 octobre 2020", "url": "https://www.fortiguard.com/psirt/FG-IR-20-110" } ] }
CERTFR-2020-AVI-329
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Fortinet FortiClient. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Windows versions antérieures à 6.4.0 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Windows versions ant\u00e9rieures \u00e0 6.4.0", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-16150", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16150" } ], "initial_release_date": "2020-06-02T00:00:00", "last_revision_date": "2020-06-02T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-329", "revisions": [ { "description": "Version initiale", "revision_date": "2020-06-02T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Fortinet FortiClient. Elle\npermet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Fortinet FortiClient", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-194 du 01 juin 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-194" } ] }
CERTFR-2020-AVI-319
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une élévation de privilèges et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | N/A | FortiAP-S/W2 versions antérieures à 6.0.6 | ||
Fortinet | FortiClient | FortiClient pour Windows versions antérieures à 6.2.2 | ||
Fortinet | N/A | FortiAP-S/W2 versions 6.2.x antérieures à 6.2.3 | ||
Fortinet | N/A | FortiAP-U versions antérieures à 6.0.2 | ||
Fortinet | N/A | FortiGateCloud versions antérieures à 20.1 |
Title | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiAP-S/W2 versions ant\u00e9rieures \u00e0 6.0.6", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Windows versions ant\u00e9rieures \u00e0 6.2.2", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-S/W2 versions 6.2.x ant\u00e9rieures \u00e0 6.2.3", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiAP-U versions ant\u00e9rieures \u00e0 6.0.2", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiGateCloud versions ant\u00e9rieures \u00e0 20.1", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-15709", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15709" }, { "name": "CVE-2020-9291", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9291" } ], "initial_release_date": "2020-05-26T00:00:00", "last_revision_date": "2020-05-26T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-319", "revisions": [ { "description": "Version initiale", "revision_date": "2020-05-26T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Elles permettent \u00e0 un attaquant de provoquer un contournement\nde la politique de s\u00e9curit\u00e9, une \u00e9l\u00e9vation de privil\u00e8ges et une\ninjection de code indirecte \u00e0 distance (XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-306 du 25 mai 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-306" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-298 du 10 f\u00e9vrier 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-298" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-040 du 25 mai 2020", "url": "https://fortiguard.com/psirt/FG-IR-20-040" } ] }
CERTFR-2020-AVI-146
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiManager | FortiManager versions antérieures à 6.2.2 | ||
Fortinet | FortiSIEM | FortiSIEM versions antérieures à 5.2.6 | ||
Fortinet | FortiWeb | FortiWeb versions 6.3.x antérieures à 6.3.1 | ||
Fortinet | FortiWeb | FortiWeb versions 6.1.x antérieures à 6.1.2 | ||
Fortinet | N/A | FortiPresence versions antérieures à 2.0.1 | ||
Fortinet | FortiWeb | FortiWeb versions 6.2.x antérieures à 6.2.1 | ||
Fortinet | FortiWeb | FortiWeb versions antérieures à 6.0.6 | ||
Fortinet | N/A | FortiIsolator versions antérieures à 2.0.0 | ||
Fortinet | FortiADC | FortiADC versions antérieures à 5.3.4 | ||
Fortinet | FortiWeb | FortiWeb versions antérieures à 6.2.3 | ||
Fortinet | FortiClient | FortiClient pour Windows versions antérieures à 6.2.3 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiManager versions ant\u00e9rieures \u00e0 6.2.2", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiSIEM versions ant\u00e9rieures \u00e0 5.2.6", "product": { "name": "FortiSIEM", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.3.x ant\u00e9rieures \u00e0 6.3.1", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.1.x ant\u00e9rieures \u00e0 6.1.2", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiPresence versions ant\u00e9rieures \u00e0 2.0.1", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions 6.2.x ant\u00e9rieures \u00e0 6.2.1", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions ant\u00e9rieures \u00e0 6.0.6", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiIsolator versions ant\u00e9rieures \u00e0 2.0.0", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiADC versions ant\u00e9rieures \u00e0 5.3.4", "product": { "name": "FortiADC", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiWeb versions ant\u00e9rieures \u00e0 6.2.3", "product": { "name": "FortiWeb", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Windows versions ant\u00e9rieures \u00e0 6.2.3", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-16157", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16157" }, { "name": "CVE-2019-6699", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6699" }, { "name": "CVE-2020-6646", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6646" }, { "name": "CVE-2019-17658", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17658" }, { "name": "CVE-2020-6643", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6643" }, { "name": "CVE-2020-6642", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6642" }, { "name": "CVE-2019-16158", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16158" }, { "name": "CVE-2020-6641", "url": "https://www.cve.org/CVERecord?id=CVE-2020-6641" }, { "name": "CVE-2019-16156", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16156" } ], "initial_release_date": "2020-03-12T00:00:00", "last_revision_date": "2020-03-12T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-146", "revisions": [ { "description": "Version initiale", "revision_date": "2020-03-12T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun contournement de la politique de s\u00e9curit\u00e9, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-220 du 09 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-220" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-271 du 11 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-271" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-270 du 09 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-270" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-240 du 12 mars 2020", "url": "https://fortiguard.com/psirt/%20FG-IR-19-240" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-20-001 du 09 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-20-001" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-281 du 09 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-281" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-258 du 09 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-258" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-269 du 11 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-269" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-265 du 09 mars 2020", "url": "https://fortiguard.com/psirt/FG-IR-19-265" } ] }
CERTFR-2019-AVI-576
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Fortinet FortiClient. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Linux versions antérieures à 6.2.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Linux versions ant\u00e9rieures \u00e0 6.2.2", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-17652", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17652" }, { "name": "CVE-2019-16152", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16152" }, { "name": "CVE-2019-15711", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15711" }, { "name": "CVE-2019-16155", "url": "https://www.cve.org/CVERecord?id=CVE-2019-16155" } ], "initial_release_date": "2019-11-18T00:00:00", "last_revision_date": "2019-11-18T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-576", "revisions": [ { "description": "Version initiale", "revision_date": "2019-11-18T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "D\u00e9ni de service" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Fortinet\nFortiClient. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire, un d\u00e9ni de service et une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Fortinet FortiClient", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-238 du 15 novembre 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-238" } ] }
CERTFR-2019-AVI-549
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans FortiClient pour MacOS. Elle permet à un attaquant d'afficher le mot de passe en clair des clients qui se connectent à une passerelle SSL VPN.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Mac OS versions 6.0.7 et antérieures. | ||
Fortinet | FortiClient | FortiClient pour Mac OS versions 6.2.0 et antérieures. |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Mac OS versions 6.0.7 et ant\u00e9rieures.", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Mac OS versions 6.2.0 et ant\u00e9rieures.", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-15704", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15704" } ], "initial_release_date": "2019-11-08T00:00:00", "last_revision_date": "2019-11-08T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-549", "revisions": [ { "description": "Version initiale", "revision_date": "2019-11-08T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans FortiClient pour MacOS. Elle\npermet \u00e0 un attaquant d\u0027afficher le mot de passe en clair des clients\nqui se connectent \u00e0 une passerelle SSL VPN.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Fortinet FortiClient pour MacOS", "vendor_advisories": [ { "published_at": null, "title": "FG-IR-19-227 du 8 novembre 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-227" } ] }
CERTFR-2019-AVI-538
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Fortinet FortiClient pour Mac OS. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Mac OS versions antérieures à 6.2.2 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Mac OS versions ant\u00e9rieures \u00e0 6.2.2", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-17650", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17650" } ], "initial_release_date": "2019-10-30T00:00:00", "last_revision_date": "2019-10-30T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-538", "revisions": [ { "description": "Version initiale", "revision_date": "2019-10-30T00:00:00.000000" } ], "risks": [ { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Fortinet FortiClient pour Mac\nOS. Elle permet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Fortinet FortiClient pour Mac OS", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet du 29 octobre 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-210" } ] }
CERTFR-2019-AVI-359
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | Les versions FortiClient pour Windows antérieures à la version 6.2.2, dont la date de disponibilité n'est pas fixée, restent vulnérables au déni de service | ||
Fortinet | FortiClient | FortiClient pour Windows versions antérieures à 6.2.1 | ||
Fortinet | FortiOS | FortiOS versions antérieures à 6.2.1 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Les versions FortiClient pour Windows ant\u00e9rieures \u00e0 la version 6.2.2, dont la date de disponibilit\u00e9 n\u0027est pas fix\u00e9e, restent vuln\u00e9rables au d\u00e9ni de service", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Windows versions ant\u00e9rieures \u00e0 6.2.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiOS versions ant\u00e9rieures \u00e0 6.2.1", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-5591", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5591" }, { "name": "CVE-2019-6692", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6692" } ], "initial_release_date": "2019-07-26T00:00:00", "last_revision_date": "2019-07-26T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-359", "revisions": [ { "description": "Version initiale", "revision_date": "2019-07-26T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "D\u00e9ni de service" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-148 du 25 juillet 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-148" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-037 du 26 juillet 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-037" } ] }
CERTFR-2019-AVI-227
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Windows versions antérieures à 6.0.6 | ||
Fortinet | N/A | FortiCASB versions antérieures à 4.1.0 |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Windows versions ant\u00e9rieures \u00e0 6.0.6", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiCASB versions ant\u00e9rieures \u00e0 4.1.0", "product": { "name": "N/A", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-5589", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5589" } ], "initial_release_date": "2019-05-16T00:00:00", "last_revision_date": "2019-05-16T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-227", "revisions": [ { "description": "Version initiale", "revision_date": "2019-05-16T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nFortinet. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une injection de code indirecte \u00e0 distance\n(XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-001 du 15 mai 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-001" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-060 du 16 mai 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-060" } ] }
CERTFR-2019-AVI-185
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Fortinet FortiClient et FortiManager. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Windows versions 6.2.0 et antérieures | ||
Fortinet | FortiManager | FortiManager versions 5.2.0 à 5.2.7, 5.4.0 et 5.4.1 | ||
Fortinet | FortiClient | FortiClient pour Mac OSX versions 6.2.0 et antérieures |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Windows versions 6.2.0 et ant\u00e9rieures", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiManager versions 5.2.0 \u00e0 5.2.7, 5.4.0 et 5.4.1", "product": { "name": "FortiManager", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient pour Mac OSX versions 6.2.0 et ant\u00e9rieures", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-1360", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1360" } ], "initial_release_date": "2019-04-24T00:00:00", "last_revision_date": "2019-04-24T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-185", "revisions": [ { "description": "Version initiale", "revision_date": "2019-04-24T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Fortinet\nFortiClient et FortiManager. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Fortinet FortiClient et FortiManager", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-110 du 23 avril 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-110" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-18-051 du 23 avril 2019", "url": "https://fortiguard.com/psirt/FG-IR-18-051" } ] }
CERTFR-2019-AVI-140
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Fortinet FortiClient Mac. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient MAC versions 6.0.x antérieures à 6.0.5 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient MAC versions 6.0.x ant\u00e9rieures \u00e0 6.0.5", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-5585", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5585" } ], "initial_release_date": "2019-04-02T00:00:00", "last_revision_date": "2019-04-02T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-140", "revisions": [ { "description": "Version initiale", "revision_date": "2019-04-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Fortinet FortiClient Mac. Elle\npermet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Fortinet FortiClient Mac", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-19-003 du 02 avril 2019", "url": "https://fortiguard.com/psirt/FG-IR-19-003" } ] }
CERTFR-2019-AVI-017
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Fortinet FortiOS et FortiClient. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiOS | FortiOS versions 5.6.0 et antérieures | ||
Fortinet | FortiClient | FortiClient Windows versions 6.0.2 et antérieures |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiOS versions 5.6.0 et ant\u00e9rieures", "product": { "name": "FortiOS", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient Windows versions 6.0.2 et ant\u00e9rieures", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-1352", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1352" }, { "name": "CVE-2018-9190", "url": "https://www.cve.org/CVERecord?id=CVE-2018-9190" } ], "initial_release_date": "2019-01-14T00:00:00", "last_revision_date": "2019-01-14T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-017", "revisions": [ { "description": "Version initiale", "revision_date": "2019-01-14T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "D\u00e9ni de service" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Fortinet FortiOS et\nFortiClient. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire et un d\u00e9ni de service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Fortinet FortiOS et FortiClient", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-18-018 du 11 janvier 2019", "url": "https://fortiguard.com/psirt/FG-IR-18-018" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-18-092 du 11 janvier 2019", "url": "https://fortiguard.com/psirt/FG-IR-18-092" } ] }
CERTFR-2018-AVI-611
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Fortinet FortiClient. Elles permettent à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient pour Windows toutes versions avec la fonctionnalité Vulnerability scan activée |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient pour Windows toutes versions avec la fonctionnalit\u00e9 Vulnerability scan activ\u00e9e", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2018-12-24T00:00:00", "last_revision_date": "2018-12-24T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-611", "revisions": [ { "description": "Version initiale", "revision_date": "2018-12-24T00:00:00.000000" } ], "risks": [ { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Fortinet\nFortiClient. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation\nde privil\u00e8ges.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Fortinet FortiClient", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-18-108 du 22 d\u00e9cembre 2018", "url": "https://fortiguard.com/psirt/FG-IR-18-108" } ] }
CERTFR-2017-AVI-471
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Fortinet FortiClient. Elle permet à un attaquant de provoquer une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Fortinet | FortiClient | FortiClient Windows versions antérieures à 5.4.4 | ||
Fortinet | FortiClient | FortiClient Windows 5.6.x antérieures à 5.6.1 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "FortiClient Windows versions ant\u00e9rieures \u00e0 5.4.4", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } }, { "description": "FortiClient Windows 5.6.x ant\u00e9rieures \u00e0 5.6.1", "product": { "name": "FortiClient", "vendor": { "name": "Fortinet", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2017-7344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7344" } ], "initial_release_date": "2017-12-14T00:00:00", "last_revision_date": "2017-12-14T00:00:00", "links": [], "reference": "CERTFR-2017-AVI-471", "revisions": [ { "description": "Version initiale", "revision_date": "2017-12-14T00:00:00.000000" } ], "risks": [ { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Fortinet FortiClient. Elle\npermet \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Fortinet FortiClient", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-17-070 du 12 d\u00e9cembre 2017", "url": "https://fortiguard.com/psirt/FG-IR-17-070" } ] }