A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-46167 A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
Fixes

Solution

Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.11 or above Please upgrade to FortiProxy version 7.2.3 or above Please upgrade to FortiProxy version 7.0.9 or above FortiSASE is no longer impacted, issue remediated Q2/23


Workaround

No workaround given by the vendor.

References
History

Wed, 18 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-09-18T20:04:30.066Z

Reserved: 2023-08-30T13:42:39.547Z

Link: CVE-2023-41675

cve-icon Vulnrichment

Updated: 2024-08-02T19:01:35.454Z

cve-icon NVD

Status : Modified

Published: 2023-10-10T17:15:12.620

Modified: 2024-11-21T08:21:27.890

Link: CVE-2023-41675

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.