First published: Thu Feb 08 2024(Updated: )
An improper certificate validation vulnerability [CWE-295] in FortiOS may allow an unauthenticated attacker in a Man-in-the-Middle position to decipher and alter the FortiLink communication channel between the FortiOS device and a FortiSwitch instance.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | ||
FortiOS | >=7.4.0<=7.4.1 | |
FortiOS | >=7.2.0<=7.2.6 | |
FortiOS | >=7.0.0<=7.0.15 | |
FortiOS | >=6.4 | |
FortiOS | >=7.0.0<7.0.14 | |
FortiOS | >=7.2.0<=7.2.6 | |
FortiOS | =7.4.0 | |
FortiOS | =7.4.1 |
Please upgrade to FortiOS version 7.4.2 or above Please upgrade to FortiOS version 7.2.7 or above Please upgrade to FortiOS version 7.0.16 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-47537 is classified as a high-severity vulnerability due to its potential to allow Man-in-the-Middle attacks.
To remediate CVE-2023-47537, upgrade FortiOS to version 7.4.2 or later, 7.2.7 or later, or 7.0.15 or later.
CVE-2023-47537 can be exploited by unauthenticated attackers to intercept and manipulate FortiLink communication.
CVE-2023-47537 affects FortiOS versions prior to 7.4.2, 7.2.7, and certain versions of 7.0.
The impact of CVE-2023-47537 includes the ability to decipher and alter communication between FortiOS devices and FortiSwitch instances.