First published: Tue Nov 14 2023(Updated: )
An improper validation of integrity check value vulnerability [CWE-354] in FortiOS 7.2.0 through 7.2.3, 7.0.0 through 7.0.12, 6.4 all versions, 6.2 all versions, 6.0 all versions and FortiProxy 7.2 all versions, 7.0 all versions, 2.0 all versions VMs may allow a local attacker with admin privileges to boot a malicious image on the device and bypass the filesystem integrity check in place.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=2.0.0<=2.0.13 | |
Fortinet FortiProxy | >=7.0.0<=7.0.13 | |
Fortinet FortiProxy | >=7.2.0<=7.2.7 | |
Fortinet FortiOS | >=6.0.0<=6.0.17 | |
Fortinet FortiOS | >=6.2.0<=6.2.15 | |
Fortinet FortiOS | >=6.4.0<=6.4.14 | |
Fortinet FortiOS | >=7.0.0<=7.0.12 | |
Fortinet FortiOS | >=7.2.0<=7.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Fortinet vulnerability is CVE-2023-28002.
The severity of CVE-2023-28002 is medium with a CVSS score of 6.4.
CVE-2023-28002 affects FortiOS versions 6.0, 6.2, 6.4, 7.0, and 7.2, as well as FortiProxy versions 2.0, 7.0, and 7.2.
A local attacker with admin privileges can exploit CVE-2023-28002 to perform an improper validation of an integrity check value.
Yes, Fortinet has released updates to address CVE-2023-28002. It is recommended to update to the latest version of FortiOS or FortiProxy.