First published: Tue Jan 14 2025(Updated: )
An origin validation error [CWE-346] vulnerability in Fortinet FortiOS IPSec VPN version 7.4.0 through 7.4.1 and version 7.2.6 and below allows an authenticated IPSec VPN user with dynamic IP addressing to send (but not receive) packets spoofing the IP of another user via crafted network packets.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=6.2.0<7.4.2 | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 | |
Fortinet FortiOS IPS Engine | >=7.2 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 |
Please upgrade to FortiOS version 7.6.0 or above Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiSASE version 22.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46715 is considered a significant vulnerability due to its potential to allow spoofing attacks by authenticated IPSec VPN users.
To remediate CVE-2023-46715, upgrade FortiOS to version 7.4.2 or later.
CVE-2023-46715 affects FortiOS versions 7.4.0 to 7.4.1 and 7.2.6 and below.
No, CVE-2023-46715 requires authenticated IPSec VPN users to exploit the vulnerability.
CVE-2023-46715 is an origin validation error that allows packet spoofing between authenticated users.