CVE-2023-50178

July 9, 2024, 6:18 p.m.

Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

FortiADC

  • 7.4.0
  • 7.2.0 - 7.2.3
  • 7.1
  • 7.0
  • 6.2
  • 6.1
  • 6.0

Source

psirt@fortinet.com

Tags

CVE-2023-50178 details

Published : July 9, 2024, 4:15 p.m.
Last Modified : July 9, 2024, 6:18 p.m.

Description

An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.

CVSS Score

1 2 3 4 5 6 7.4 8 9 10

Weakness

Weakness Name Description
CWE-295 Improper Certificate Validation The product does not validate, or incorrectly validates, a certificate.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

Base Score

7.4

Exploitability Score

2.2

Impact Score

5.2

Base Severity

HIGH

References

URL Source
https://fortiguard.fortinet.com/psirt/FG-IR-22-298 psirt@fortinet.com
This website uses the NVD API, but is not approved or certified by it.