Description
An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.
Published: 2024-07-09
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please upgrade to FortiADC version 7.4.1 or above Please upgrade to FortiADC version 7.2.4 or above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-55000 An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.
History

Thu, 19 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortiadc
CPEs cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiadc

Subscriptions

Fortinet Fortiadc
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-08-02T22:09:49.750Z

Reserved: 2023-12-05T13:18:34.865Z

Link: CVE-2023-50178

cve-icon Vulnrichment

Updated: 2024-08-02T22:09:49.750Z

cve-icon NVD

Status : Modified

Published: 2024-07-09T16:15:03.390

Modified: 2024-11-21T08:36:36.533

Link: CVE-2023-50178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses