// For flags

CVE-2019-17656

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.

Una vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en el demonio HTTPD de FortiOS versiones 6.0.10 y por debajo, versiones 6.2.2 y por debajo y FortiProxy versiones 1.0.x, 1.1.x, 1.2.9 y por debajo, versiones 2.0.0 y por debajo, puede permitir a un atacante remoto autenticado bloquear el servicio mediante el envío de una petición PUT malformada hacia el servidor. Fortinet no tiene conocimiento de ninguna explotación con éxito de esta vulnerabilidad que podría conllevar a una ejecución de código

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-10-16 CVE Reserved
  • 2021-04-12 CVE Published
  • 2023-08-02 EPSS Updated
  • 2024-10-25 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fortinet
Search vendor "Fortinet"
Fortiproxy
Search vendor "Fortinet" for product "Fortiproxy"
>= 1.0.0 < 1.2.10
Search vendor "Fortinet" for product "Fortiproxy" and version " >= 1.0.0 < 1.2.10"
-
Affected
Fortinet
Search vendor "Fortinet"
Fortiproxy
Search vendor "Fortinet" for product "Fortiproxy"
>= 2.0.0 < 2.0.2
Search vendor "Fortinet" for product "Fortiproxy" and version " >= 2.0.0 < 2.0.2"
-
Affected
Fortinet
Search vendor "Fortinet"
Fortios
Search vendor "Fortinet" for product "Fortios"
<= 6.0.10
Search vendor "Fortinet" for product "Fortios" and version " <= 6.0.10"
-
Affected
Fortinet
Search vendor "Fortinet"
Fortios
Search vendor "Fortinet" for product "Fortios"
>= 6.2.0 <= 6.2.2
Search vendor "Fortinet" for product "Fortios" and version " >= 6.2.0 <= 6.2.2"
-
Affected