Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30035 | Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] in Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests. |
Solution
Please upgrade to FortiADC version 7.2.1 or above Please upgrade to FortiADC version 7.1.3 or above Please upgrade to FortiADCManager version 7.2.0 or above Please upgrade to FortiADCManager version 7.1.1 or above Please upgrade to FortiADCManager version 7.0.1 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-076 |
|
Wed, 14 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] in Fortinet FortiADCManager version 7.1.0 and before 7.0.0, FortiADC version 7.2.0 and before 7.1.2 allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests. | Multiple improper neutralization of special elements used in an os command ('OS Command Injection') vulnerabilties [CWE-78] vulnerability in Fortinet allows a local authenticated attacker to execute arbitrary shell code as `root` user via crafted CLI requests. |
| First Time appeared |
Fortinet fortiadcmanager
|
|
| CPEs | cpe:2.3:h:fortinet:fortiadc:5.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.7:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.2.8:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.3.7:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:5.4.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.0.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.1.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.0.6:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.3.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:5.4.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.1.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.2.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:6.2.1:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:7.0.0:*:*:*:*:*:*:* cpe:2.3:h:fortinet:fortiadcmanager:7.1.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet fortiadcmanager
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-01-14T14:15:28.898Z
Reserved: 2023-02-20T15:09:20.637Z
Link: CVE-2023-26210
Updated: 2024-08-02T11:46:23.415Z
Status : Modified
Published: 2023-06-13T09:15:16.510
Modified: 2026-01-14T15:15:53.513
Link: CVE-2023-26210
No data.
OpenCVE Enrichment
No data.
EUVD