First published: Fri Jun 16 2023(Updated: )
A null pointer dereference in Fortinet FortiOS before 7.2.5 and before 7.0.11, FortiProxy before 7.2.3 and before 7.0.9 allows attacker to denial of sslvpn service via specifically crafted request in network parameter.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<=7.0.9 | |
Fortinet FortiProxy | >=7.2.0<=7.2.3 | |
Fortinet FortiOS | >=7.0.0<7.0.11 | |
Fortinet FortiOS | >=7.2.0<7.2.5 |
Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.11 or above Please upgrade to FortiOS version 6.4.13 or above Please upgrade to FortiProxy version 7.2.4 or above Please upgrade to FortiProxy version 7.2.3 or above Please upgrade to FortiProxy version 7.0.9 or above Please upgrade to FortiProxy version 7.0.10 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33307 is a null pointer dereference vulnerability in Fortinet FortiOS and FortiProxy that can be exploited to cause a denial of service in the sslvpn service.
An attacker can exploit CVE-2023-33307 by sending a specifically crafted request in the network parameter.
Fortinet FortiOS versions before 7.2.5 and before 7.0.11 are affected by CVE-2023-33307.
FortiProxy versions before 7.2.3 and before 7.0.9 are affected by CVE-2023-33307.
CVE-2023-33307 has a severity score of 6.5, classified as medium severity.
To mitigate the CVE-2023-33307 vulnerability, it is recommended to update Fortinet FortiOS to version 7.2.5 or 7.0.11, and FortiProxy to version 7.2.3 or 7.0.9.
More information about CVE-2023-33307 can be found at the following references: [IBM X-Force Exchange](https://exchange.xforce.ibmcloud.com/vulnerabilities/258201) and [FortiGuard Security Advisory](https://fortiguard.com/psirt/FG-IR-23-015).