CVE-2020-12819
Severity CVSS v4.0:
Pending analysis
Type:
CWE-122
Heap-based Buffer Overflow
Publication date:
19/12/2024
Last modified:
21/01/2025
Description
A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 5.6.13 (excluding) | |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.0.11 (excluding) |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 6.2.0 (including) | 6.2.5 (excluding) |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 6.4.0 (including) | 6.4.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



