An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-22-298 |
History
Thu, 19 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortiadc |
|
CPEs | cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortiadc |
MITRE
Status: PUBLISHED
Assigner: fortinet
Published: 2024-07-09T15:33:32.203Z
Updated: 2024-08-02T22:09:49.750Z
Reserved: 2023-12-05T13:18:34.865Z
Link: CVE-2023-50178
Vulnrichment
Updated: 2024-08-02T22:09:49.750Z
NVD
Status : Modified
Published: 2024-07-09T16:15:03.390
Modified: 2024-11-21T08:36:36.533
Link: CVE-2023-50178
Redhat
No data.