First published: Tue Apr 08 2025(Updated: )
Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities in Fortinet FortiOS SSL VPN webmode version 7.4.0, version 7.2.0 through 7.2.5, version 7.0.1 through 7.0.11 and version 6.4.7 through 6.4.14 and Fortinet FortiProxy SSL VPN webmode version 7.2.0 through 7.2.6 and version 7.0.0 through 7.0.12 allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS SSL VPN webmode | >=7.2.0<7.2.6>=7.0.1<7.0.12>=6.4.7<6.4.14 | |
Fortinet FortiProxy SSL VPN webmode | >=7.2.0<7.2.6>=7.0.0<7.0.12 |
Please upgrade to FortiOS version 7.4.1 or above Please upgrade to FortiOS version 7.2.6 or above Please upgrade to FortiOS version 7.0.13 or above Please upgrade to FortiOS version 6.4.15 or above Please upgrade to FortiOS version 6.4.14 or above Please upgrade to FortiProxy version 7.4.0 or above Please upgrade to FortiProxy version 7.2.7 or above Please upgrade to FortiProxy version 7.0.13 or above FortiSASE is no longer impacted, issue remediated Q3/23 ## Workaround: Disable SSLVPN webmode. Alternatively, please use SSLVPN tunnel mode, IPsec (tunnel) or ZTNA (web access). https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-SSL-VPN-Web-Mode-or-Tunnel-Mode-in/ta-p/217990 https://docs.fortinet.com/document/fortigate/7.2.3/administration-guide/45836/ssl-vpn-to-ipsec-vpn https://docs.fortinet.com/document/fortigate/7.2.3/administration-guide/78050/migrating-from-ssl-vpn-to-ztna
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37930 has been assigned a high severity rating due to its potential to allow unauthorized access and system compromise.
To fix CVE-2023-37930, users should upgrade FortiOS SSL VPN webmode to version 7.4.1 or later and FortiProxy SSL VPN webmode to version 7.2.6 or later.
CVE-2023-37930 affects FortiOS SSL VPN webmode versions 6.4.7 to 6.4.14, 7.0.1 to 7.0.11, and 7.2.0 to 7.2.5, as well as FortiProxy SSL VPN webmode versions 7.0.0 to 7.0.12 and 7.2.0 to 7.2.6.
CVE-2023-37930 includes vulnerabilities such as the use of uninitialized resources and excessive iteration, which can be exploited for denial of service and data compromise.
Organizations using the affected versions of Fortinet FortiOS SSL VPN webmode and FortiProxy SSL VPN webmode are at risk due to CVE-2023-37930.