Vulnerability Description
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiap | >= 6.0.0, < 7.0.6 |
| Fortinet | Fortiap-C | >= 5.2.0, < 5.4.5 |
| Fortinet | Fortiap-U | >= 5.4.0, < 6.2.6 |
| Fortinet | Fortiap-W2 | >= 6.0.0, <= 7.0.1 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/psirt/FG-IR-22-120Vendor Advisory
- https://fortiguard.com/psirt/FG-IR-22-120Vendor Advisory
FAQ
What is CVE-2023-25608?
CVE-2023-25608 is a vulnerability with a CVSS score of 5.5 (MEDIUM). An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1...
How severe is CVE-2023-25608?
CVE-2023-25608 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-25608?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiap, Fortinet Fortiap-C, Fortinet Fortiap-U, Fortinet Fortiap-W2.