First published: Tue Mar 12 2024(Updated: )
A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.14 | |
Fortinet FortiOS IPS Engine | >=6.2.0<=6.2.15 | |
Fortinet FortiProxy | =. | |
Fortinet FortiProxy | >=7.2.0<=7.2.6 | |
Fortinet FortiProxy | >=7.0.0<=7.0.12 | |
Fortinet FortiProxy | >=2.0.0<=2.0.13 | |
Fortinet FortiSASE | =3 | |
Fortinet FortiProxy | >=2.0.0<=2.0.13 | |
Fortinet FortiProxy | >=7.0.0<=7.0.12 | |
Fortinet FortiProxy | >=7.2.0<=7.2.6 | |
Fortinet FortiProxy | =7.4.0 | |
Fortinet FortiOS IPS Engine | >=6.2.0<=6.2.15 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.14 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 |
Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.6 or above Please upgrade to FortiOS version 7.0.13 or above Please upgrade to FortiOS version 6.4.15 or above Please upgrade to FortiOS version 6.2.16 or above Please upgrade to FortiProxy version 7.4.1 or above Please upgrade to FortiProxy version 7.2.7 or above Please upgrade to FortiProxy version 7.0.13 or above Please upgrade to FortiProxy version 2.0.14 or above Fortinet in Q3/23 has remediated this issue in FortiSASE version 23.3.b and hence the customers need not perform any action.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42790 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2023-42790, upgrade FortiOS to version 7.4.2 or later, FortiProxy to version 7.4.1 or later, or apply the relevant patches for affected versions.
CVE-2023-42790 affects multiple versions of Fortinet FortiOS and FortiProxy, specifically across various versions listed in the CVE description.
CVE-2023-42790 can be exploited by an attacker to execute unauthorized code on the affected FortiOS and FortiProxy devices.
CVE-2023-42790 impacts Fortinet FortiOS and FortiProxy across multiple version ranges as outlined in the vulnerability details.