An improper certificate validation vulnerability [CWE-295] in FortiOS 6.2 all versions, 6.4 all versions, 7.0.0 through 7.0.10, 7.2.0 and FortiProxy 1.2 all versions, 2.0 all versions, 7.0.0 through 7.0.9, 7.2.0 through 7.2.3 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the vulnerable device and the remoteĀ FortiGuard's map server.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32776 An improper certificate validation vulnerability [CWE-295] in FortiOS 6.2 all versions, 6.4 all versions, 7.0.0 through 7.0.10, 7.2.0 and FortiProxy 1.2 all versions, 2.0 all versions, 7.0.0 through 7.0.9, 7.2.0 through 7.2.3 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the vulnerable device and the remoteĀ FortiGuard's map server.
Fixes

Solution

Please upgrade to FortiOS version 7.2.1 or above Please upgrade to FortiOS version 7.0.11 or above Please upgrade to FortiProxy version 7.2.4 or above Please upgrade to FortiProxy version 7.0.10 or above


Workaround

No workaround given by the vendor.

References
History

Tue, 22 Oct 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-10-22T20:45:26.647Z

Reserved: 2023-04-03T08:47:30.451Z

Link: CVE-2023-29175

cve-icon Vulnrichment

Updated: 2024-08-02T14:00:15.949Z

cve-icon NVD

Status : Modified

Published: 2023-06-13T09:15:17.027

Modified: 2024-11-21T07:56:39.663

Link: CVE-2023-29175

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.