CVE-2023-33299

critical

Description

A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed.

From the Tenable Blog

CVE-2023-33299: Critical Remote Code Execution Vulnerability in FortiNAC
CVE-2023-33299: Critical Remote Code Execution Vulnerability in FortiNAC

Published: 2023-06-23

Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC

References

https://www.tenable.com/blog/cve-2023-33299-critical-remote-code-execution-vulnerability-in-fortinac

https://fortiguard.com/psirt/FG-IR-23-074

Details

Source: Mitre, NVD

Published: 2023-06-23

Updated: 2023-11-07

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical