Home

Description

An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.

PUBLISHED Reserved 2023-10-09 | Published 2024-05-14 | Updated 2024-08-02 | Assigner fortinet




MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N/E:P/RL:X/RC:C

Problem types

Improper access control

Product status

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

2.0.0 (semver)
affected

Default status
unaffected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

6.2.0 (semver)
affected

References

fortiguard.com/psirt/FG-IR-23-225

cve.org (CVE-2023-45586)

nvd.nist.gov (CVE-2023-45586)

Download JSON