Headline
CVE-2023-25608: Fortiguard
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
** PSIRT Advisories**
FortiAP’s - Arbitrary file read through the CLI
Summary
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP, FortiAP-W2, FortiAP-U, FortiAP-C may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
Affected Products
FortiAP-W2 version 7.2.0 through 7.2.1
FortiAP-W2 version 7.0.3 through 7.0.5
FortiAP-W2 version 7.0.0 through 7.0.1
FortiAP-W2 6.4 all versions
FortiAP-W2 6.2 all versions
FortiAP-W2 6.0 all versions
FortiAP-C version 5.4.0 through 5.4.4
FortiAP-C 5.2 all versions
FortiAP version 7.2.0 through 7.2.1
FortiAP version 7.0.0 through 7.0.5
FortiAP 6.4 all versions
FortiAP 6.0 all versions
FortiAP-U version 7.0.0
FortiAP-U version 6.2.0 through 6.2.5
FortiAP-U 6.0 all versions
FortiAP-U 5.4 all versions
Solutions
Please upgrade to FortiAP-W2 version 7.2.2 or above
Please upgrade to FortiAP-W2 version 7.0.6 or above
Please upgrade to FortiAP-C version 5.4.5 or above
Please upgrade to FortiAP version 7.2.2 or above
Please upgrade to FortiAP version 7.0.6 or above
Please upgrade to FortiAP-U version 7.0.1 or above
Please upgrade to FortiAP-U version 6.2.6 or above
Acknowledgement
Internally discovered and reported by Wilfried Djettchou of Fortinet Product Security team.
Timeline
2023-09-07: Initial publication