First published: Fri Jun 16 2023(Updated: )
A null pointer dereference in Fortinet FortiOS before 7.2.5, before 7.0.11 and before 6.4.13, FortiProxy before 7.2.4 and before 7.0.10 allows attacker to denial of sslvpn service via specifically crafted request in bookmark parameter.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<7.0.10 | |
Fortinet FortiProxy | >=7.2.0<7.2.4 | |
Fortinet FortiOS | >=6.4.0<6.4.13 | |
Fortinet FortiOS | >=7.0.0<7.0.11 | |
Fortinet FortiOS | >=7.2.0<7.2.5 |
Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.11 or above Please upgrade to FortiOS version 6.4.13 or above Please upgrade to FortiProxy version 7.2.4 or above Please upgrade to FortiProxy version 7.2.3 or above Please upgrade to FortiProxy version 7.0.9 or above Please upgrade to FortiProxy version 7.0.10 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33306 is a null pointer dereference vulnerability in Fortinet FortiOS, FortiProxy, and SSL VPN service.
CVE-2023-33306 affects Fortinet FortiOS versions before 7.2.5, before 7.0.11, and before 6.4.13. It also affects FortiProxy versions before 7.2.4 and before 7.0.10.
CVE-2023-33306 has a severity rating of 6.5 (Medium).
An attacker can exploit CVE-2023-33306 by sending a specifically crafted request in the bookmark parameter, resulting in a denial of SSL VPN service.
Yes, Fortinet has released updates to address CVE-2023-33306. It is recommended to update to FortiOS 7.2.5, 7.0.11, or 6.4.13, or FortiProxy 7.2.4 or 7.0.10 to mitigate the vulnerability.