CVE CVE

CVE-2023-48788

CISA Known Exploited Vulnerability (KEV)

Fortinet FortiClient EMS SQL Injection Vulnerability

March 25, 2024

April 15, 2024

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

A improper neutralization of special elements used in an sql command (‘sql injection’) in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

Weakness Enumeration

CWE-ID CWE Name

CWE-89
Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)

Known Affected Software Configurations


cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.8:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.9:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.10:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.3:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.4:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.6:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.7:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.8:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.9:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.2.0:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.2.1:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.2.2:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.6:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.0.0:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.0:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.1:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.2:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.3:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.4:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.5:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.6:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.0.8:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.1:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.2:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.3:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.4:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.6:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.7:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.8:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.2:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.3:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.4:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.7:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.0:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.1:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:7.0.2:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.0:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.4.1:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:-:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.0:*:*:*:*:*:*:*

cpe:2.3:a:fortinet:forticlient_enterprise_management_server:6.2.9:*:*:*:*:*:*:*

Details

Source:
NVD
Published:
Updated:

Risk information

CVSS v3

Base score:
9.8
Severity:

CRITICAL

Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2

Not defined