CVE-2024-50571
Severity CVSS v4.0:
Pending analysis
Type:
CWE-122
Heap-based Buffer Overflow
Publication date:
14/10/2025
Last modified:
27/01/2026
Description
A heap-based buffer overflow vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.2, FortiAnalyzer 7.4.0 through 7.4.5, FortiAnalyzer 7.2.0 through 7.2.9, FortiAnalyzer 7.0.0 through 7.0.13, FortiAnalyzer 6.4 all versions, FortiAnalyzer 6.2 all versions, FortiAnalyzer 6.0 all versions, FortiAnalyzer Cloud 7.4.1 through 7.4.5, FortiAnalyzer Cloud 7.2.1 through 7.2.9, FortiAnalyzer Cloud 7.0.1 through 7.0.13, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.1, FortiManager 7.4.0 through 7.4.5, FortiManager 7.2.0 through 7.2.9, FortiManager 7.0.0 through 7.0.13, FortiManager 6.4 all versions, FortiManager 6.2 all versions, FortiManager 6.0 all versions, FortiManager Cloud 7.6.2, FortiManager Cloud 7.4.1 through 7.4.5, FortiManager Cloud 7.2.1 through 7.2.9, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4 all versions, FortiOS 7.6.0 through 7.6.2, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2.0 through 7.2.10, FortiOS 7.0.0 through 7.0.16, FortiOS 6.4.0 through 6.4.15, FortiOS 6.2 all versions, FortiProxy 7.6.0 through 7.6.1, FortiProxy 7.4.0 through 7.4.7, FortiProxy 7.2.0 through 7.2.12, FortiProxy 7.0.0 through 7.0.19, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1 all versions, FortiProxy 1.0 all versions allows attacker to execute unauthorized code or commands via specifically crafted requests.
Impact
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | 7.0.0 (including) | 7.0.14 (excluding) |
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | 7.2.0 (including) | 7.2.10 (excluding) |
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | 7.4.0 (including) | 7.4.6 (excluding) |
| cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* | 7.6.0 (including) | 7.6.3 (excluding) |
| cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:* | 6.4.1 (including) | 7.0.14 (excluding) |
| cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:* | 7.2.1 (including) | 7.2.10 (excluding) |
| cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:* | 7.4.1 (including) | 7.4.6 (excluding) |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | 6.0.0 (including) | 7.0.14 (excluding) |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | 7.2.0 (including) | 7.2.10 (excluding) |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | 7.4.0 (including) | 7.4.6 (excluding) |
| cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* | 7.6.0 (including) | 7.6.2 (excluding) |
| cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:* | 6.4.1 (including) | 7.0.14 (excluding) |
| cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:* | 7.2.1 (including) | 7.2.10 (excluding) |
| cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:* | 7.4.1 (including) | 7.4.6 (excluding) |
| cpe:2.3:a:fortinet:fortimanager_cloud:7.6.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



