Логотип exploitDog
bind:CVE-2024-35279
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-35279

Количество 3

Количество 3

nvd логотип

CVE-2024-35279

12 месяцев назад

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-8ccx-r52j-39f8

12 месяцев назад

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2025-01610

12 месяцев назад

Уязвимость реализации протокола Control and Provisioning of Wireless Access Points (CAPWAP) операционной системы FortiOS, позволяющая нарушителю выполнить произвольный код или произвольные команды

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-35279

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.

CVSS3: 8.1
0%
Низкий
12 месяцев назад
github логотип
GHSA-8ccx-r52j-39f8

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.

CVSS3: 8.1
0%
Низкий
12 месяцев назад
fstec логотип
BDU:2025-01610

Уязвимость реализации протокола Control and Provisioning of Wireless Access Points (CAPWAP) операционной системы FortiOS, позволяющая нарушителю выполнить произвольный код или произвольные команды

CVSS3: 8.1
0%
Низкий
12 месяцев назад

Уязвимостей на страницу