Happy #PatchTuesday from **Fortinet**: <li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-422"; target="_blank" rel="nofollow noopener">FG-IR-24-422</a> CVE-2024-52966 (2.3 low) Disclosure of Logs of Devices not belonging to the Current ADOM from Log View</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-23-261"; target="_blank" rel="nofollow noopener">FG-IR-23-261</a> CVE-2023-40721 (6.7 medium) FortiOS / FortiProxy / FortiPAM / FortiSwitchManager - Format string vulnerability in CLI commands</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-300"; target="_blank" rel="nofollow noopener">FG-IR-24-300</a> CVE-2024-52968 (6.7 medium) Improper Authentication in FortiMonitor Agent</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-23-279"; target="_blank" rel="nofollow noopener">FG-IR-23-279</a> CVE-2024-40586 (6.7 medium) Improper access control to FortiSslvpnNamedPipe</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-311"; target="_blank" rel="nofollow noopener">FG-IR-24-311</a> CVE-2024-40585 (6.5 medium) Insertion of sensitive information into Event log</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-063"; target="_blank" rel="nofollow noopener">FG-IR-24-063</a> CVE-2024-27781 (7.1 high) Multiple Reflected and Stored Cross-Site Scripting</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-147"; target="_blank" rel="nofollow noopener">FG-IR-24-147</a> CVE-2024-36508 (6.0 medium) Multiple arbitrary file deletion in the CLI</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-438"; target="_blank" rel="nofollow noopener">FG-IR-24-438</a> CVE-2024-50567 and CVE-2024-50569 (7.2 high) OS Command Injections</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-220"; target="_blank" rel="nofollow noopener">FG-IR-24-220</a> CVE-2024-40584 (7.2 high) OS command injection in external connector</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-015"; target="_blank" rel="nofollow noopener">FG-IR-25-015</a> CVE-2025-24470 (8.6 high) Off-by-slash vulnerability in Nginx config</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-302"; target="_blank" rel="nofollow noopener">FG-IR-24-302</a> CVE-2024-40591 (8.8 high) Permission escalation due to an Improper Privilege Management</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-23-324"; target="_blank" rel="nofollow noopener">FG-IR-23-324</a> CVE-2024-27780 (3.1 low) Reflected XSS (cross site scripting) in incident page</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-160"; target="_blank" rel="nofollow noopener">FG-IR-24-160</a> CVE-2024-35279 (8.1 high) Stack buffer overflow in fabric service</li><li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-24-094"; target="_blank" rel="nofollow noopener">FG-IR-24-094</a> CVE-2024-33504 (4.1 medium) Use of Hard-coded Cryptographic Key to encrypt sensitive data</li>
Fortinet downplays the CVSSv3.1 score by listing temporal only, I have listed base score instead. No mention of [exploitation](https://infosec.press/screaminggoat/vendor-verbiage ).
#fortinet #fortios #fortiproxy #fortiswitchmanager #cve #vulnerability #infosec #cybersecurity