A use after free vulnerability [CWE-416] in FortiOS version 7.2.0 through 7.2.4 and version 7.0.0 through 7.0.10 and FortiProxy version 7.2.0 through 7.2.2 and version 7.0.0 through 7.0.8 may allow an unauthenticated remote attacker to crash the WAD process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-184 |
History
Wed, 18 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2023-10-10T16:49:55.789Z
Updated: 2024-09-18T20:04:30.066Z
Reserved: 2023-08-30T13:42:39.547Z
Link: CVE-2023-41675
Vulnrichment
Updated: 2024-08-02T19:01:35.454Z
NVD
Status : Modified
Published: 2023-10-10T17:15:12.620
Modified: 2024-11-21T08:21:27.890
Link: CVE-2023-41675
Redhat
No data.