Products
FortiADC
- 7.4.0
- 7.2.0 - 7.2.3
- 7.1
- 7.0
- 6.2
- 6.1
- 6.0
Source
psirt@fortinet.com
Tags
CVE-2023-50178 details
Published : July 9, 2024, 4:15 p.m.
Last Modified : July 9, 2024, 6:18 p.m.
Last Modified : July 9, 2024, 6:18 p.m.
Description
An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2.0 through 7.2.3, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and various remote servers such as private SDN connectors and FortiToken Cloud.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.4 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-295 | Improper Certificate Validation | The product does not validate, or incorrectly validates, a certificate. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
Base Score
7.4
Exploitability Score
2.2
Impact Score
5.2
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
References
URL | Source |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-22-298 | psirt@fortinet.com |
This website uses the NVD API, but is not approved or certified by it.