First published: Mon Jun 12 2023(Updated: )
An improper certificate validation vulnerability [CWE-295] in FortiOS and FortiProxy may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the vulnerable device and the remote FortiGuard's map server.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-22-468 is classified as critical due to the potential for a remote unauthenticated attacker to execute a Man-in-the-Middle attack.
To fix FG-IR-22-468, it is recommended to upgrade FortiOS or FortiProxy to the latest version that addresses this certificate validation vulnerability.
FG-IR-22-468 affects Fortinet FortiOS and FortiProxy devices.
Yes, FG-IR-22-468 can be exploited remotely by an unauthenticated attacker.
FG-IR-22-468 allows for a Man-in-the-Middle attack on the communication channel between the vulnerable device and the remote FortiGuard's map server.