CVE-2023-45586

EUVD-2023-49878
An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
fortinetCNA
4.7 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N/E:P/RL:X/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
Affected Products (NVD)
VendorProductVersion
fortinetfortiproxy
2.0.0 ≤
𝑥
≤ 2.0.12
fortinetfortiproxy
7.0.0 ≤
𝑥
< 7.0.14
fortinetfortiproxy
7.2.0 ≤
𝑥
< 7.2.8
fortinetfortiproxy
7.4.0
fortinetfortiproxy
7.4.1
fortinetfortios
6.2.0 ≤
𝑥
≤ 6.2.16
fortinetfortios
6.4.0 ≤
𝑥
≤ 6.4.15
fortinetfortios
7.0.0 ≤
𝑥
< 7.0.13
fortinetfortios
7.2.0 ≤
𝑥
< 7.2.8
fortinetfortios
7.4.0
fortinetfortios
7.4.1
𝑥
= Vulnerable software versions