Description
An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiADC version 7.4.1 or above Please upgrade to FortiADC version 7.2.4 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-55000 | An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud. |
References
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-22-298 |
|
History
Thu, 19 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortiadc |
|
| CPEs | cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Fortinet
Fortinet fortiadc |
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T22:09:49.750Z
Reserved: 2023-12-05T13:18:34.865Z
Link: CVE-2023-50178
Updated: 2024-08-02T22:09:49.750Z
Status : Modified
Published: 2024-07-09T16:15:03.390
Modified: 2024-11-21T08:36:36.533
Link: CVE-2023-50178
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD