CVE-2023-45586
EUVD-2023-4987814.05.2024, 17:15
An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| fortinet | fortiproxy | 2.0.0 ≤ 𝑥 ≤ 2.0.12 |
| fortinet | fortiproxy | 7.0.0 ≤ 𝑥 < 7.0.14 |
| fortinet | fortiproxy | 7.2.0 ≤ 𝑥 < 7.2.8 |
| fortinet | fortiproxy | 7.4.0 |
| fortinet | fortiproxy | 7.4.1 |
| fortinet | fortios | 6.2.0 ≤ 𝑥 ≤ 6.2.16 |
| fortinet | fortios | 6.4.0 ≤ 𝑥 ≤ 6.4.15 |
| fortinet | fortios | 7.0.0 ≤ 𝑥 < 7.0.13 |
| fortinet | fortios | 7.2.0 ≤ 𝑥 < 7.2.8 |
| fortinet | fortios | 7.4.0 |
| fortinet | fortios | 7.4.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration