Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-46718: Execute unauthorized code or commands in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2023-46718cvecve-2023-46718
Published: Tue Oct 14 2025 (10/14/2025, 15:23:02 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands.

AI-Powered Analysis

AILast updated: 10/14/2025, 15:52:07 UTC

Technical Analysis

CVE-2023-46718 is a stack-based buffer overflow vulnerability identified in Fortinet FortiOS versions 6.0.13 through 7.4.1. This flaw arises from improper handling of input in the command-line interface (CLI), where specially crafted commands can overflow the stack buffer. Successful exploitation allows an attacker with high-level privileges (PR:H) and local access (AV:L) to execute arbitrary code or commands on the affected device. The vulnerability impacts confidentiality, integrity, and availability (all rated high), potentially allowing attackers to compromise the device fully. The vulnerability does not require user interaction (UI:N) and does not escalate privileges beyond those already held. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component. Although no public exploits are currently known, the presence of this vulnerability in widely deployed FortiOS versions used in firewalls and security appliances makes it a significant concern. Fortinet has not yet released patches at the time of this report, emphasizing the need for vigilance. The CVSS v3.1 base score is 6.3, reflecting medium severity due to the requirement for local high privileges and limited attack vector. The vulnerability is particularly critical because FortiOS devices are often frontline security devices, and compromise could lead to network-wide impacts.

Potential Impact

For European organizations, exploitation of CVE-2023-46718 could lead to full compromise of FortiOS devices, which are commonly used as firewalls, VPN gateways, and security appliances. This could result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within corporate environments. Critical infrastructure sectors such as finance, energy, telecommunications, and government agencies relying on Fortinet devices could face operational disruptions and data breaches. The confidentiality of sensitive information could be severely impacted, alongside integrity and availability of network security functions. Given the widespread deployment of Fortinet products in Europe, the threat could affect a broad range of organizations, increasing the risk of targeted attacks or insider threats exploiting this vulnerability. The lack of known exploits currently provides a window for proactive mitigation, but the medium severity score and potential impact warrant urgent attention.

Mitigation Recommendations

1. Monitor Fortinet’s official channels closely for the release of security patches addressing CVE-2023-46718 and apply them immediately upon availability. 2. Restrict CLI access to FortiOS devices strictly to trusted administrators using secure management networks and multi-factor authentication. 3. Implement network segmentation to limit access to management interfaces and reduce the attack surface. 4. Conduct regular audits of administrative accounts and privilege levels to ensure no unnecessary high privileges are granted. 5. Enable and review detailed logging and alerting on CLI command usage to detect anomalous or unauthorized commands. 6. Employ host-based intrusion detection systems (HIDS) on management workstations to detect exploitation attempts. 7. Consider temporary compensating controls such as disabling unused management protocols or interfaces until patches are applied. 8. Train security teams on the specific characteristics of this vulnerability to improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2023-10-25T08:43:15.290Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b53b

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 10/14/2025, 3:52:07 PM

Last updated: 10/16/2025, 2:19:28 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats