{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T08:24:33.951","vulnerabilities":[{"cve":{"id":"CVE-2024-32118","sourceIdentifier":"psirt@fortinet.com","published":"2024-11-12T19:15:09.287","lastModified":"2025-01-17T20:42:17.053","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and Fortinet FortiAnalyzer-BigData before 7.4.0 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests."},{"lang":"es","value":"Vulnerabilidades de neutralización incorrecta múltiple de elementos especiales utilizados en un comando del sistema operativo ('Inyección de comando del sistema operativo') [CWE-78] en Fortinet FortiManager versión 7.4.0 a 7.4.2 y anteriores a 7.2.5, Fortinet FortiAnalyzer versión 7.4.0 a 7.4.2 y anteriores a 7.2.5 y Fortinet FortiAnalyzer-BigData anterior a 7.4.0 permiten que un atacante privilegiado autenticado ejecute código o comandos no autorizados a través de solicitudes CLI manipuladas."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndExcluding":"7.2.6","matchCriteriaId":"FF6CA5B2-29DE-4FB3-8D7D-D248A593AB79"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.3","matchCriteriaId":"AF309EFD-1770-44AF-B192-3D9816F792CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.1","versionEndExcluding":"7.2.8","matchCriteriaId":"1A9C272F-2E14-4BC3-B3A3-1EF4E93BDBFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer_big_data:7.4.0:*:*:*:*:*:*:*","matchCriteriaId":"80598594-A45A-4E69-B968-1DD3DBD30FF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndExcluding":"7.2.6","matchCriteriaId":"A3F113AF-AA71-466D-9841-15A5243ECFF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.3","matchCriteriaId":"E4490512-36ED-4212-9D34-D74739A56E84"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-24-116","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}