CVE-2023-45586
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
Una verificación insuficiente de la vulnerabilidad de autenticidad de datos [CWE-345] en Fortinet FortiOS SSL-VPN modo túnel versión 7.4.0 a 7.4.1, versión 7.2.0 a 7.2.7 y anteriores a 7.0.12 y versión de modo túnel FortiProxy SSL-VPN 7.4.0 a 7.4.1, versión 7.2.0 a 7.2.7 y anteriores a 7.0.13 permiten que un usuario de VPN autenticado envíe (pero no reciba) paquetes que falsifiquen la IP de otro usuario a través de paquetes de red manipulados.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-10-09 CVE Reserved
- 2024-05-14 CVE Published
- 2024-05-24 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-345: Insufficient Verification of Data Authenticity
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-23-225 | 2024-05-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | >= 2.0.0 <= 2.0.12 Search vendor "Fortinet" for product "Fortiproxy" and version " >= 2.0.0 <= 2.0.12" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | >= 7.0.0 < 7.0.14 Search vendor "Fortinet" for product "Fortiproxy" and version " >= 7.0.0 < 7.0.14" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | >= 7.2.0 < 7.2.8 Search vendor "Fortinet" for product "Fortiproxy" and version " >= 7.2.0 < 7.2.8" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | 7.4.0 Search vendor "Fortinet" for product "Fortiproxy" and version "7.4.0" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | 7.4.1 Search vendor "Fortinet" for product "Fortiproxy" and version "7.4.1" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 6.2.0 <= 6.2.16 Search vendor "Fortinet" for product "Fortios" and version " >= 6.2.0 <= 6.2.16" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 6.4.0 <= 6.4.15 Search vendor "Fortinet" for product "Fortios" and version " >= 6.4.0 <= 6.4.15" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 7.0.0 < 7.0.13 Search vendor "Fortinet" for product "Fortios" and version " >= 7.0.0 < 7.0.13" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 7.2.0 < 7.2.8 Search vendor "Fortinet" for product "Fortios" and version " >= 7.2.0 < 7.2.8" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | 7.4.0 Search vendor "Fortinet" for product "Fortios" and version "7.4.0" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | 7.4.1 Search vendor "Fortinet" for product "Fortios" and version "7.4.1" | - |
Affected
|