A stack-based overflow vulnerability [CWE-124] in Fortinet FortiOS version 7.0.0 through 7.0.10 and 7.2.0 through 7.2.3 and FortiProxy version 7.0.0 through 7.0.9 and 7.2.0 through 7.2.2 allows a remote unauthenticated attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside deep or full packet inspection.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-183 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Aug 2023, 20:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:7.2.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-787 | |
References | (MISC) https://fortiguard.com/psirt/FG-IR-23-183 - Vendor Advisory |
26 Jul 2023, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-26 15:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-33308
Mitre link : CVE-2023-33308
CVE.ORG link : CVE-2023-33308
JSON object : View
Products Affected
fortinet
- fortios
- fortiproxy