First published: Tue Jul 09 2024(Updated: )
An improper certificate validation vulnerability [CWE-295] in FortiADC 7.4.0, 7.2 all versions, 7.1 all versions, 7.0 all versions may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the device and public SDN connectors.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=7.0.0<7.4.1 |
Please upgrade to FortiADC version 7.4.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50179 is considered a critical vulnerability due to its potential for remote and unauthenticated Man-in-the-Middle attacks.
To address CVE-2023-50179, upgrade FortiADC to version 7.4.1 or later.
Users of FortiADC may be vulnerable to attackers intercepting sensitive data transmitted through public SDN connectors.
CVE-2023-50179 affects all versions of FortiADC from 7.0.0 up to, but not including, 7.4.1.
No, CVE-2023-50179 can be exploited by remote and unauthenticated attackers.