CVE-2023-25610
Published: 24 March 2025
Description
Adversaries may abuse Unix shell commands and scripts for execution.
Security Summary
CVE-2023-25610 is a buffer underwrite (buffer underflow) vulnerability, classified under CWE-124, affecting the administrative interface of multiple Fortinet products. It impacts FortiOS versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.6, 6.4.0 through 6.4.11, and 6.2.12 and below; FortiProxy versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, and 2.0.12 and below; and FortiOS-6K7K versions 7.0.5, 6.4.0 through 6.4.10, and 6.2.0 through 6.2.10 and below.
A remote unauthenticated attacker can exploit this vulnerability by sending specifically crafted requests to the administrative interface, potentially achieving execution of arbitrary code or commands. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network accessibility, low complexity, lack of required privileges or user interaction, and high impact on confidentiality, integrity, and availability.
Mitigation details are provided in the Fortinet PSIRT advisory at https://fortiguard.com/psirt/FG-IR-23-001.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Buffer underwrite in admin interface enables remote unauthenticated RCE via crafted requests (T1190: Exploit Public-Facing Application); results in arbitrary code/command execution on FortiOS (T1059.004: Unix Shell).