Vulnerabilites related to fortinet - fortigate_7000
Vulnerability from fkie_nvd
Published
2023-06-13 09:15
Modified
2025-03-10 20:40
Summary
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.



{
   cisaActionDue: "2023-07-04",
   cisaExploitAdd: "2023-06-13",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6BBF05F-4967-4A2E-A8F8-C2086097148B",
                     versionEndIncluding: "1.1.6",
                     versionStartIncluding: "1.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "33B84D9A-55E3-4146-A55A-ACB507E61B05",
                     versionEndIncluding: "1.2.13",
                     versionStartIncluding: "1.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C1D5E6B-A23E-4A92-B53C-720AFEB1B951",
                     versionEndIncluding: "2.0.12",
                     versionStartIncluding: "2.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAC18F7E-5242-4F36-BB42-FEC33B3AC075",
                     versionEndIncluding: "7.0.9",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A99FF48-370E-4D2A-B5CC-889EA21AB213",
                     versionEndIncluding: "7.2.3",
                     versionStartIncluding: "7.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EA5512D-6EE5-4DF3-A960-C02394F25225",
                     versionEndIncluding: "6.0.16",
                     versionStartIncluding: "6.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CD57A5A-2B13-495A-8530-8F97E1720602",
                     versionEndIncluding: "6.2.13",
                     versionStartIncluding: "6.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E99B6E5-7EC3-406C-AFAC-A5E32DE266DF",
                     versionEndIncluding: "6.4.12",
                     versionStartIncluding: "6.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2573C90-BE6A-4D5D-A223-F09213318909",
                     versionEndIncluding: "7.0.11",
                     versionStartIncluding: "7.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB643A8-B52F-4D54-B816-28A6401BAA25",
                     versionEndIncluding: "7.2.4",
                     versionStartIncluding: "7.2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D997493-24C2-4A78-9DF0-6438E9415A3C",
                     versionEndIncluding: "6.0.16",
                     versionStartIncluding: "6.0.12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A0D0D55-1A51-454D-A8B1-D7100D453102",
                     versionEndIncluding: "6.2.13",
                     versionStartIncluding: "6.2.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA6AF1FA-A034-439A-876B-BFA1BE7DE15E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9694FC0C-408A-4892-ADD1-F36F4BBBD9EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B8A132F-601F-4129-BFCA-3A976A711D5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "90600B14-07C4-455D-9FC1-17034D91B987",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B28478DA-8D10-4A8E-81EA-D3DF421E5089",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.4.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2F935F9-5B6A-47C2-8F65-7A1E8BB061FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.4.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "751D2FC7-482F-4C6B-95DB-244004A2738E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.4.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEE44B20-6F00-4962-9929-5A5054BBA94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:6.4.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB2FF1DA-001B-4CA1-9F46-427D9C92CBC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:7.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "48D0E8CC-3815-4697-86D0-DC7F66E70520",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fortinet:fortios:7.0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C6C937-4477-438D-A252-E4102D758120",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:fortinet:fortigate_6000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BB410C9-CDD4-4068-97E0-6D83AE62B7F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:fortinet:fortigate_7000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0CBA773-10C1-410D-BB01-771F454ABEBA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.",
      },
   ],
   id: "CVE-2023-27997",
   lastModified: "2025-03-10T20:40:57.323",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "psirt@fortinet.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-06-13T09:15:16.613",
   references: [
      {
         source: "psirt@fortinet.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-097",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://fortiguard.com/psirt/FG-IR-23-097",
      },
   ],
   sourceIdentifier: "psirt@fortinet.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-122",
            },
         ],
         source: "psirt@fortinet.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2023-27997
Vulnerability from cvelistv5
Published
2023-06-13 08:41
Modified
2024-10-23 13:18
Summary
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.
Impacted products
Vendor Product Version
Fortinet FortiOS-6K7K Version: 7.0.10
Version: 7.0.5
Version: 6.4.12
Version: 6.4.10
Version: 6.4.8
Version: 6.4.6
Version: 6.4.2
Version: 6.2.9    6.2.13
Version: 6.2.6    6.2.7
Version: 6.2.4
Version: 6.0.12    6.0.16
Version: 6.0.10
Create a notification for this product.
   Fortinet FortiProxy Version: 7.2.0    7.2.3
Version: 7.0.0    7.0.9
Version: 2.0.0    2.0.12
Version: 1.2.0    1.2.13
Version: 1.1.0    1.1.6
Create a notification for this product.
   Fortinet FortiOS Version: 7.2.0    7.2.4
Version: 7.0.0    7.0.11
Version: 6.4.0    6.4.12
Version: 6.2.0    6.2.13
Version: 6.0.0    6.0.16
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T12:23:30.864Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "https://fortiguard.com/psirt/FG-IR-23-097",
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://fortiguard.com/psirt/FG-IR-23-097",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-27997",
                        options: [
                           {
                              Exploitation: "active",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-23T13:18:08.089433Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
               {
                  other: {
                     content: {
                        dateAdded: "2023-06-13",
                        reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-27997",
                     },
                     type: "kev",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-23T13:18:14.745Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "FortiOS-6K7K",
               vendor: "Fortinet",
               versions: [
                  {
                     status: "affected",
                     version: "7.0.10",
                  },
                  {
                     status: "affected",
                     version: "7.0.5",
                  },
                  {
                     status: "affected",
                     version: "6.4.12",
                  },
                  {
                     status: "affected",
                     version: "6.4.10",
                  },
                  {
                     status: "affected",
                     version: "6.4.8",
                  },
                  {
                     status: "affected",
                     version: "6.4.6",
                  },
                  {
                     status: "affected",
                     version: "6.4.2",
                  },
                  {
                     lessThanOrEqual: "6.2.13",
                     status: "affected",
                     version: "6.2.9",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.7",
                     status: "affected",
                     version: "6.2.6",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "6.2.4",
                  },
                  {
                     lessThanOrEqual: "6.0.16",
                     status: "affected",
                     version: "6.0.12",
                     versionType: "semver",
                  },
                  {
                     status: "affected",
                     version: "6.0.10",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "FortiProxy",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.2.3",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.9",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "2.0.12",
                     status: "affected",
                     version: "2.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "1.2.13",
                     status: "affected",
                     version: "1.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "1.1.6",
                     status: "affected",
                     version: "1.1.0",
                     versionType: "semver",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "FortiOS",
               vendor: "Fortinet",
               versions: [
                  {
                     lessThanOrEqual: "7.2.4",
                     status: "affected",
                     version: "7.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "7.0.11",
                     status: "affected",
                     version: "7.0.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.4.12",
                     status: "affected",
                     version: "6.4.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.2.13",
                     status: "affected",
                     version: "6.2.0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.0.16",
                     status: "affected",
                     version: "6.0.0",
                     versionType: "semver",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A heap-based buffer overflow vulnerability [CWE-122] in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.2,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:R",
                  version: "3.1",
               },
               format: "CVSS",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-122",
                     description: "Execute unauthorized code or commands",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-06-13T08:41:47.415Z",
            orgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
            shortName: "fortinet",
         },
         references: [
            {
               name: "https://fortiguard.com/psirt/FG-IR-23-097",
               url: "https://fortiguard.com/psirt/FG-IR-23-097",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "Please upgrade to FortiOS-6K7K version 7.0.12 or above\r\nPlease upgrade to FortiOS-6K7K version 6.4.13 or above\r\nPlease upgrade to FortiOS-6K7K version 6.2.15 or above\r\nPlease upgrade to FortiOS-6K7K version 6.0.17 or above\r\nPlease upgrade to FortiProxy version 7.2.4 or above\r\nPlease upgrade to FortiProxy version 7.0.10 or above\r\nPlease upgrade to FortiOS version 7.4.0 or above\r\nPlease upgrade to FortiOS version 7.2.5 or above\r\nPlease upgrade to FortiOS version 7.0.12 or above\r\nPlease upgrade to FortiOS version 6.4.13 or above\r\nPlease upgrade to FortiOS version 6.2.14 or above\r\nPlease upgrade to FortiOS version 6.0.17 or above",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
      assignerShortName: "fortinet",
      cveId: "CVE-2023-27997",
      datePublished: "2023-06-13T08:41:47.415Z",
      dateReserved: "2023-03-09T10:09:33.119Z",
      dateUpdated: "2024-10-23T13:18:14.745Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}