First published: Tue Nov 12 2024(Updated: )
A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.13 allows attacker to execute unauthorized code or commands via phishing SAML authentication link.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.0.0<7.0.14 | |
Fortinet FortiOS IPS Engine | >=7.2.0<7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.13 |
Please upgrade to FortiOS version 7.4.4 or above Please upgrade to FortiOS version 7.2.8 or above Please upgrade to FortiOS version 7.0.14 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50176 has a high severity rating due to its potential to allow unauthorized code execution via session fixation.
To fix CVE-2023-50176, upgrade Fortinet FortiOS to version 7.4.4 or higher, 7.2.8 or higher, or 7.0.14 or higher.
CVE-2023-50176 affects FortiOS versions 7.4.0 to 7.4.3, 7.2.0 to 7.2.7, and 7.0.0 to 7.0.13.
CVE-2023-50176 is classified as a session fixation vulnerability.
Yes, CVE-2023-50176 can be exploited through phishing SAML authentication links.