{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T01:46:07.720","vulnerabilities":[{"cve":{"id":"CVE-2024-32123","sourceIdentifier":"psirt@fortinet.com","published":"2025-03-11T15:15:41.353","lastModified":"2025-07-24T19:05:03.987","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2\r\n7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 and 5.6.0 through 5.6.11 and 5.4.0 through 5.4.7 and 5.2.0 through 5.2.10 and 5.0.0 through 5.0.12 and 4.3.4 through 4.3.8 allows attacker to execute unauthorized code or commands via crafted CLI requests."},{"lang":"es","value":"La neutralización incorrecta múltiple de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiManager, FortiAnalyzer versiones 7.4.0 a 7.4.2, 7.2.0 a 7.2.5 y 7.0.0 a 7.0.12 y 6.4.0 a 6.4.14 y 6.2.0 a 6.2.12 y 6.0.0 a 6.0.12 y 5.6.0 a 5.6.11 y 5.4.0 a 5.4.7 y 5.2.0 a 5.2.10 y 5.0.0 a 5.0.12 y 4.3.4 a 4.3.8 permite a los atacantes ejecutar código o comandos no autorizados a través de solicitudes CLI manipuladas."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndExcluding":"7.2.6","matchCriteriaId":"FF6CA5B2-29DE-4FB3-8D7D-D248A593AB79"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.4","matchCriteriaId":"E6F162A7-0D01-43E0-99D8-D7B87B080853"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.5","versionEndExcluding":"7.2.8","matchCriteriaId":"17F350D2-FED3-4F8F-A41B-6B582A1920DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer_big_data:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.2","matchCriteriaId":"C58AC0D2-C9BE-4E50-9C54-DD41D2DA16A0"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"4.3.4","versionEndExcluding":"7.2.6","matchCriteriaId":"A15C289C-78E8-4322-8F1D-A6474B2936C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4.0","versionEndExcluding":"7.4.4","matchCriteriaId":"3AE9CAFD-5D5B-4799-8690-624225963595"}]}]}],"references":[{"url":"https://fortiguard.com/psirt/FG-IR-24-124","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}