CVE-2023-36553: Critical FortiSIEM OS Command Injection Vulnerability

Organizations utilizing FortiSIEM, a prominent Security Information and Event Management (SIEM) solution, are urged to take immediate action to address a critical vulnerability, identified as CVE-2023-36553. This vulnerability, rated with a CVSS score of 9.3, grants remote attackers the ability to execute arbitrary commands on affected systems, potentially compromising sensitive data and disrupting operations.

The Vulnerability in Detail

The vulnerability stems from an improper neutralization of special elements used in an OS Command vulnerability (CWE-78) within FortiSIEM’s report server. By crafting malicious API requests, attackers can exploit this flaw to gain control of the system and execute arbitrary commands, allowing them to:

  • Gain unauthorized access to sensitive data
  • Install malware or backdoors
  • Disrupt or disable FortiSIEM operations

Affected Products

This critical vulnerability affects a wide range of FortiSIEM versions, including:

  • FortiSIEM 5.4 all versions
  • FortiSIEM 5.3 all versions
  • FortiSIEM 5.2 all versions
  • FortiSIEM 5.1 all versions
  • FortiSIEM 5.0 all versions
  • FortiSIEM 4.10 all versions
  • FortiSIEM 4.9 all versions
  • FortiSIEM 4.7 all versions


Fortinet, the developer of FortiSIEM, has released patched versions that address this vulnerability. Affected organizations are strongly advised to upgrade to the following patched versions immediately:

  • FortiSIEM version 7.1.0 or above
  • FortiSIEM version 7.0.1 or above
  • FortiSIEM version 6.7.6 or above
  • FortiSIEM version 6.6.4 or above
  • FortiSIEM version 6.5.2 or above
  • FortiSIEM version 6.4.3 or above

The CVE-2023-36553 vulnerability in FortiSIEM poses a significant security risk to organizations that rely on this platform. Promptly upgrading to the patched versions and implementing additional security measures are crucial to mitigate this risk and protect sensitive data. Organizations should act swiftly to address this vulnerability and safeguard their IT infrastructure.