A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 and  Fortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-304 |       | 
History
                    Fri, 11 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Fortinet fortianalyzer Big Data | |
| CPEs | cpe:2.3:a:fortinet:fortianalyzer_bigdata:6.2.5:*:*:*:*:*:*:* | cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortianalyzer_big_data:6.2.5:*:*:*:*:*:*:* | 
| Vendors & Products | Fortinet fortianalyzer Bigdata | Fortinet fortianalyzer Big Data | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: fortinet
Published: 2024-03-12T15:09:16.279Z
Updated: 2024-08-12T18:09:17.558Z
Reserved: 2023-09-04T08:12:52.814Z
Link: CVE-2023-41842
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T19:09:49.300Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-03-12T15:15:45.920
Modified: 2025-07-11T20:06:38.330
Link: CVE-2023-41842
 Redhat
                        Redhat
                    No data.