CVE-2023-34992
FortiSIEM vulnerability analysis and mitigation

Overview

A critical OS command injection vulnerability (CVE-2023-34992) was discovered in Fortinet FortiSIEM affecting versions 7.0.0, 6.7.0 through 6.7.5, 6.6.0 through 6.6.3, 6.5.0 through 6.5.1, and 6.4.0 through 6.4.2. The vulnerability allows remote unauthenticated attackers to execute unauthorized code or commands via crafted API requests. This vulnerability was discovered by security researcher Zach Hanley of Horizon3.ai and was initially disclosed on October 10, 2023 (Fortinet Advisory, Horizon3).

Technical details

The vulnerability stems from improper neutralization of special elements used in an OS Command (CWE-78) in the FortiSIEM supervisor component. The issue exists in the phMonitor service listening on tcp/7900, which exposes multiple command handlers without authentication. Specifically, the handleStorageRequest() handler (command type 81) processes XML payloads containing user-controlled data that is later passed to system() calls without proper sanitization. The vulnerability received a CVSS v3.1 base score of 9.8 (Critical) (Fortinet Advisory, Horizon3).

Impact

The vulnerability allows attackers to execute unauthorized code or commands with root privileges. This access enables reading of secrets for integrated systems, potentially allowing for pivotal movement into connected systems. The high severity is due to the unauthenticated nature of the exploit and the level of access gained (Horizon3).

Mitigation and workarounds

Fortinet has released patches to address this vulnerability. Organizations should upgrade to FortiSIEM version 7.1.2 or above, version 7.0.3 or above, version 6.7.9 or above, version 6.6.4 or above, version 6.5.3 or above, or version 6.4.4 or above. FortiSIEM versions 7.3, 7.2, 6.3, 6.2, 6.1, and 5.4 are not affected by this vulnerability (Fortinet Advisory).

Additional resources


SourceThis report was generated using AI

Related FortiSIEM vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-25256CRITICAL9.8
  • FortiSIEMFortiSIEM
  • cpe:2.3:a:fortinet:fortisiem
NoYesAug 12, 2025
CVE-2023-40714HIGH8.8
  • FortiSIEMFortiSIEM
  • cpe:2.3:a:fortinet:fortisiem
NoYesApr 02, 2025
CVE-2019-17659HIGH8.1
  • FortiSIEMFortiSIEM
  • cpe:2.3:a:fortinet:fortisiem
NoYesMar 17, 2025
CVE-2025-58324MEDIUM4.8
  • FortiSIEMFortiSIEM
  • cpe:2.3:a:fortinet:fortisiem
NoYesOct 14, 2025
CVE-2024-55592LOW3.8
  • FortiSIEMFortiSIEM
  • cpe:2.3:a:fortinet:fortisiem
NoYesMar 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management