First published: Tue Nov 14 2023(Updated: )
An improper validation of integrity check value vulnerability [CWE-354] in FortiOS VMs may allow a local attacker with admin privileges to boot a malicious image on the device and bypass the filesytem integrity check in place.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.3 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiOS IPS Engine | >=6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-22-396 is categorized as critical due to the potential for exploitation by local attackers with admin access.
To fix FG-IR-22-396, apply the latest firmware updates provided by Fortinet for FortiOS.
FG-IR-22-396 affects FortiOS VMs that have improper validation of integrity check values.
A local attacker with admin privileges can exploit FG-IR-22-396 to boot a malicious image on the device.
The implications of FG-IR-22-396 include the ability to bypass filesystem integrity checks, leading to potential unauthorized access or control of the system.