First published: Tue Oct 10 2023(Updated: )
A use after free vulnerability [CWE-416] in FortiOS & FortiProxy may allow an unauthenticated remote attacker to crash the Web Proxy process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<=7.0.8 | |
Fortinet FortiProxy | =7.2.0 | |
Fortinet FortiProxy | =7.2.1 | |
Fortinet FortiProxy | =7.2.2 | |
Fortinet FortiOS | >=7.0.0<=7.0.10 | |
Fortinet FortiOS | >=7.2.0<=7.2.4 |
Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.11 or above Please upgrade to FortiProxy version 7.2.3 or above Please upgrade to FortiProxy version 7.0.9 or above FortiSASE is no longer impacted, issue remediated Q2/23
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41675 is a use after free vulnerability in FortiOS and FortiProxy versions 7.0.0 through 7.0.10 and 7.2.0 through 7.2.4.
The severity of CVE-2023-41675 is medium with a CVSS score of 5.3.
CVE-2023-41675 may allow an unauthenticated remote attacker to crash the WAD process in FortiOS.
CVE-2023-41675 may allow an unauthenticated remote attacker to crash the WAD process in FortiProxy.
Yes, Fortinet has released fixes for CVE-2023-41675. It is recommended to update to the latest version of FortiOS or FortiProxy.