FortiOS Vulnerability

HIGH (7.5) Patch Available

Threat Intelligence

Low Risk
EPSS Score: 0.01% chance of exploitation (percentile: 1%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Fortinet FortiOS is a network security platform used to manage and secure networks. This vulnerability allows attackers to execute arbitrary code on the device by sending specially crafted packets, potentially leading to unauthorized access to sensitive data or disruption of network services.

Am I affected?

You're affected if you use A stack-based buffer overflow vulnerability. Affected versions: 7.4.8, 7.6.3 If you don't recognise this software, you're probably not affected.

Affected Products

Fortinet / FortiOS

How to fix

Upgrade to FortiOS 7.6.4 or above.
- For immediate mitigations:
- Disable security fabric access into interface (Fortinet remediated this issue in 25.3.c, so customers do not need to perform any action).
- Only allow legit devices in the Wifi Controller configuration.
- Remove inter-controller-peer elements in config wireless-controller inter-controller configuration.
- Follow the recommended upgrade path using Fortinet's tool at: https://docs.fortinet.com/upgrade-tool

References