Home Fortinet CVE-2023-33299
Back to Fortinet

CVE-2023-33299

FortiNAC - Inter-Server Communication

Fortinet CVSS 9.8 Updated March 18, 2026

Executive Risk Summary

"A deserialization of untrusted data vulnerability in Fortinet FortiNAC allows an attacker to execute unauthorized code or commands via a specifically crafted request on the inter-server communication port. This vulnerability affects FortiNAC versions below 7.2.1, below 9.4.3, below 9.2.8, and all earlier versions of 8.x, with versions 8.x having no available fix."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset FortiNAC
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

FortiNAC vulnerability CVE-2023-33299: Deserialization of untrusted data allows unauthorized code execution. Verify version and apply patch if necessary.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Fortinet Fortinac (Version 9.4.2)Fortinet Fortinac (Version 7.2.1)Fortinet Fortinac (Version 9.4.1)Fortinet Fortinac (Version 7.2.0)Fortinet Fortinac (Version 9.4.0)Fortinet Fortinac (Version 8.3.7)Fortinet Fortinac

Original NVD Description

"A deserialization of untrusted data in Fortinet FortiNAC below 7.2.1, below 9.4.3, below 9.2.8 and all earlier versions of 8.x allows attacker to execute unauthorized code or commands via specifically crafted request on inter-server communication port. Note FortiNAC versions 8.x will not be fixed."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.