Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Please upgrade to FortiOS version 6.2.2 and above. Please upgrade to FortiOS version 6.0.7 and above.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-16255 | An Improper Neutralization of Input vulnerability affecting FortiGate version 6.2.0 through 6.2.1, 6.0.0 through 6.0.6 in the hostname parameter of a DHCP packet under DHCP monitor page may allow an unauthenticated attacker in the same network as the FortiGate to perform a Stored Cross Site Scripting attack (XSS) by sending a crafted DHCP packet. |
| Link | Providers |
|---|---|
| https://fortiguard.com/advisory/FG-IR-19-184 |
|
Thu, 24 Jul 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
Mon, 17 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 17 Mar 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Neutralization of Input vulnerability affecting FortiGate version 6.2.0 through 6.2.1, 6.0.0 through 6.0.6 in the hostname parameter of a DHCP packet under DHCP monitor page may allow an unauthenticated attacker in the same network as the FortiGate to perform a Stored Cross Site Scripting attack (XSS) by sending a crafted DHCP packet. | |
| First Time appeared |
Fortinet
Fortinet fortios |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortios |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-03-17T17:56:56.460Z
Reserved: 2019-01-23T00:00:00.000Z
Link: CVE-2019-6697
Updated: 2025-03-17T14:19:12.367Z
Status : Analyzed
Published: 2025-03-17T14:15:16.567
Modified: 2025-07-24T20:15:34.693
Link: CVE-2019-6697
No data.
OpenCVE Enrichment
No data.
EUVD