CVE-2023-40721

A use of externally-controlled format string vulnerability [CWE-134] vulnerability in Fortinet allows a privileged attacker to execute arbitrary code or commands via specially crafted requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-23-261 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:7.4.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-02-11 17:15

Updated : 2026-01-14 15:15


NVD link : CVE-2023-40721

Mitre link : CVE-2023-40721

CVE.ORG link : CVE-2023-40721


JSON object : View

Products Affected

fortinet

  • fortiswitchmanager
  • fortios
  • fortiproxy
  • fortipam
CWE
CWE-134

Use of Externally-Controlled Format String