Executive Risk Summary
"A buffer copy without checking size of input vulnerability in Fortinet FortiSwitchAX may allow an unauthenticated attacker to execute unauthorized code or commands on the device. This vulnerability can be exploited by sending a crafted LLDP packet, potentially leading to code execution or command injection."
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.
Patch Impact Forecast
Network disruption possible during firmware update
Internal Work Notes
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Scope of Impact
Original NVD Description
"A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiSwitchAXFixed 1.0.0 through 1.0.1 may allow an unauthenticated attacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet."