First published: Mon Jun 12 2023(Updated: )
An access of uninitialized pointer vulnerability [CWE-824] in FortiOS administrative interface API may allow an authenticated attacker to repetitively crash the httpsd process via crafted HTTP or HTTPS requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.4 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.11 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiOS IPS Engine | >=6.0 | |
Fortinet FortiProxy | >=7.2.0<=7.2.3 | |
Fortinet FortiProxy | >=7.0.0<=7.0.9 | |
Fortinet FortiProxy | >=2.0 | |
Fortinet FortiProxy | >=1.2 | |
Fortinet FortiProxy | >=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-095 is significant due to its potential to cause denial of service by crashing the httpsd process.
To mitigate FG-IR-23-095, upgrade FortiOS to version 7.2.5 or later, or 7.0.12 or later for affected versions.
FortiOS versions between 7.2.0 and 7.2.4, and versions between 7.0.0 and 7.0.11 are affected by FG-IR-23-095.
Yes, FG-IR-23-095 can affect FortiProxy versions between 7.2.0 and 7.2.3.
Organizations using vulnerable versions of FortiOS and FortiProxy that allow authenticated access are affected by FG-IR-23-095.