No analysis available yet.
Vendor Solution
Please upgrade to FortiProxy version 7.4.2 or above Please upgrade to FortiProxy version 7.2.8 or above Please upgrade to FortiProxy version 7.0.14 or above Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.8 or above Please upgrade to FortiOS version 7.0.13 or above Please upgrade to FortiSASE version 23.4.a or above
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-49878 | An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets. |
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-225 |
|
No history.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T20:21:16.569Z
Reserved: 2023-10-09T08:01:29.296Z
Link: CVE-2023-45586
Updated: 2024-08-02T20:21:16.569Z
Status : Modified
Published: 2024-05-14T17:15:24.560
Modified: 2024-11-21T08:27:00.740
Link: CVE-2023-45586
No data.
OpenCVE Enrichment
No data.
EUVD