An improper certificate validation vulnerability in Fortinet FortiOS 7.0.0 - 7.0.13, 7.2.0 - 7.2.6, 7.4.0 - 7.4.1 and 6.4 all versions allows a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the FortiLink communication channel between the FortiOS device and FortiSwitch.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-51648 | An improper certificate validation vulnerability in Fortinet FortiOS 7.0.0 - 7.0.13, 7.2.0 - 7.2.6, 7.4.0 - 7.4.1 and 6.4 all versions allows a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the FortiLink communication channel between the FortiOS device and FortiSwitch. |
Fixes
Solution
Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.7 or above Please upgrade to FortiOS version 7.0.16 or above
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-301 |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T21:09:37.377Z
Reserved: 2023-11-06T10:35:25.828Z
Link: CVE-2023-47537

Updated: 2024-08-02T21:09:37.377Z

Status : Modified
Published: 2024-02-15T14:15:45.240
Modified: 2024-11-21T08:30:25.100
Link: CVE-2023-47537

No data.

No data.