Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-23113

CVSS 9.8 · Critical KEV EPSS 54.38% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-23113

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用外部控制的格式字符串
Source: NVD (National Vulnerability Database)
Vulnerability Title
Fortinet FortiOS 格式化字符串错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS存在格式化字符串错误漏洞,该漏洞源于使用外部控制的格式字符串,允许攻击者通过特制数据包执行未经授权的代码或命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
FortinetFortiSwitchManager 7.2.0 ~ 7.2.3 -
FortinetFortiOS 7.4.0 ~ 7.4.2 -
FortinetFortiPAM 1.2.0 -
FortinetFortiProxy 7.4.0 ~ 7.4.2 -

II. Public POCs for CVE-2024-23113

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/cvedayprotech/CVE-2024-23113POC Details
2CVE-2024-23113 FortiOS SSL VPN RCEhttps://github.com/tr1pl3ight/CVE-2024-23113-POCPOC Details
3Nonehttps://github.com/cvedayprotech3s/cve-2024-23113POC Details
4CVE-2024-23113 FortiOS SSL VPN RCEhttps://github.com/foxymoxxy/CVE-2024-23113-POCPOC Details
5CVE-2024-23113 Exploit with More than 20000 Targetshttps://github.com/labesterOct/CVE-2024-23113POC Details
6Nonehttps://github.com/nothe1senberg/CVE-2024-23113POC Details
7Nonehttps://github.com/OxLmahdi/cve-2024-23113POC Details
8test_private_CVEhttps://github.com/CheckCve2/CVE-2024-23113POC Details
9Nonehttps://github.com/HazeLook/CVE-2024-23113POC Details
10Nonehttps://github.com/maybelookis/CVE-2024-23113POC Details
11Nonehttps://github.com/p33d/CVE-2024-23113POC Details
12CVE-2024-23113-Private-POChttps://github.com/groshi/CVE-2024-23113-Private-POCPOC Details
13Nonehttps://github.com/Jaden1419/CVE-2024-23113POC Details
14Nonehttps://github.com/hatvix1/CVE-2024-23113POC Details
15CVE-2024-23113 是存在于某特定软件或系统中的一个安全漏洞,该漏洞允许恶意攻击者在特定条件下利用系统中的缺陷实现未经授权的行为。这种行为可能包括但不限于远程代码执行、访问敏感信息或以更高权限执行操作。https://github.com/zgimszhd61/CVE-2024-23113POC Details
16Nonehttps://github.com/puckiestyle/CVE-2024-23113POC Details
17POC TO RCEhttps://github.com/radoslavatanasov1/CVE-2024-23113POC Details
18Nonehttps://github.com/expl0itsecurity/CVE-2024-23113POC Details
19Nonehttps://github.com/XiaomingX/cve-2024-23113-expPOC Details
20CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。https://github.com/XiaomingX/CVE-2024-23113-pocPOC Details
21CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。https://github.com/XiaomingX/cve-2024-23113-pocPOC Details
22This python scripts searches a client list to see if their FortiGate device is vulnerable to this CVE.https://github.com/valornode/CVE-2024-23113POC Details
23Nonehttps://github.com/MAVRICK-1/cve-2024-23113-test-envPOC Details
24CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。https://github.com/ownouwa/cve-2024-23113-pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-23113

登录查看更多情报信息。

Same Patch Batch · Fortinet · 2024-02-15 · 5 CVEs total

CVE-2023-455817.9 HIGHFortinet FortiClient EMS 安全漏洞
CVE-2023-262066.8 MEDIUMFortinet FortiNAC 跨站脚本漏洞
CVE-2023-442534.7 MEDIUMFortinet FortiManager 信息泄露漏洞
CVE-2023-475374.4 MEDIUMFortinet FortiOS 信任管理问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-23113

No comments yet


Leave a comment