Products
Fortinet FortiOS SSL-VPN tunnel mode
- 7.4.0 - 7.4.1
- 7.2.0 - 7.2.7
- before 7.0.12
FortiProxy SSL-VPN tunnel mode
- 7.4.0 - 7.4.1
- 7.2.0 - 7.2.7
- before 7.0.13
Source
psirt@fortinet.com
Tags
CVE-2023-45586 details
Last Modified : May 14, 2024, 7:17 p.m.
Description
An insufficient verification of data authenticity vulnerability [CWE-345] in Fortinet FortiOS SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.12 & FortiProxy SSL-VPN tunnel mode version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 allows an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
CVSS Score
1 | 2 | 3 | 4 | 5.0 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
Base Score
5.0
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
References
URL | Source |
---|---|
https://fortiguard.com/psirt/FG-IR-23-225 | psirt@fortinet.com |