First published: Tue Jul 09 2024(Updated: )
An improper certificate validation vulnerability [CWE-295] in FortiWeb 7.2.0 through 7.2.1, 7.0 all versions, 6.4 all versions and 6.3 all versions may allow a remote and unauthenticated attacker in a Man-in-the-Middle position to decipher and/or tamper with the communication channel between the device and different endpoints used to fetch data for Web Application Firewall (WAF).
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.3.0<7.2.2 |
Please upgrade to FortiWeb version 7.2.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33509 is assessed as a critical vulnerability due to its potential impact on communication security.
To mitigate CVE-2024-33509, upgrade FortiWeb to version 7.2.2 or later.
CVE-2024-33509 affects FortiWeb versions 7.2.0 through 7.2.1, as well as all versions of 7.0, 6.4, and 6.3.
CVE-2024-33509 allows remote unauthenticated attackers to perform Man-in-the-Middle attacks.
Exploitation of CVE-2024-33509 may allow attackers to decipher or tamper with the communication channels.