A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
References
History

Wed, 18 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published: 2023-10-10T16:49:55.789Z

Updated: 2024-09-18T20:04:30.066Z

Reserved: 2023-08-30T13:42:39.547Z

Link: CVE-2023-41675

cve-icon Vulnrichment

Updated: 2024-08-02T19:01:35.454Z

cve-icon NVD

Status : Modified

Published: 2023-10-10T17:15:12.620

Modified: 2023-11-07T04:21:04.410

Link: CVE-2023-41675

cve-icon Redhat

No data.