Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-26774 | A out-of-bounds write in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.10, FortiOS version 6.4.0 through 6.4.11, FortiOS version 6.2.0 through 6.2.13, FortiOS all versions 6.0, FortiProxy version 7.2.0 through 7.2.1, FortiProxy version 7.0.0 through 7.0.7, FortiProxy all versions 2.0, FortiProxy all versions 1.2, FortiProxy all versions 1.1, FortiProxy all versions 1.0 allows an authenticated attacker to execute unauthorized code or commands via specifically crafted requests. |
Solution
Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.4 or above Please upgrade to FortiOS version 7.0.11 or above Please upgrade to FortiOS version 6.4.12 or above Please upgrade to FortiOS version 6.2.14 or above Please upgrade to FortiProxy version 7.2.2 or above Please upgrade to FortiProxy version 7.0.8 or above Workaround: Disable "Host Check", "Restrict to Specific OS Versions" and "MAC address host checking" in sslvpn portal configuration. For example for "full-access" sslvpn portal: config vpn ssl web portal edit "full-access" set os-check disable set host-check none set mac-addr-check disable end
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-22-475 |
![]() ![]() |
Wed, 23 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:28:13.885Z
Reserved: 2023-01-05T10:06:31.522Z
Link: CVE-2023-22640

Updated: 2024-08-02T10:13:49.407Z

Status : Modified
Published: 2023-05-03T22:15:17.857
Modified: 2024-11-21T07:45:06.567
Link: CVE-2023-22640

No data.

No data.