Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-49878 | An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets. |
Solution
Please upgrade to FortiProxy version 7.4.2 or above Please upgrade to FortiProxy version 7.2.8 or above Please upgrade to FortiProxy version 7.0.14 or above Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.8 or above Please upgrade to FortiOS version 7.0.13 or above Please upgrade to FortiSASE version 23.4.a or above
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-225 |
![]() ![]() ![]() |
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T20:21:16.569Z
Reserved: 2023-10-09T08:01:29.296Z
Link: CVE-2023-45586

Updated: 2024-08-02T20:21:16.569Z

Status : Modified
Published: 2024-05-14T17:15:24.560
Modified: 2024-11-21T08:27:00.740
Link: CVE-2023-45586

No data.

No data.