First published: Mon Jun 12 2023(Updated: )
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS and FortiProxy SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests. ## Workaround: Disable SSL-VPN.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-097 is high due to the potential for remote code execution.
To mitigate FG-IR-23-097, disable the SSL-VPN feature on affected FortiOS and FortiProxy devices.
FG-IR-23-097 affects Fortinet FortiOS and FortiProxy SSL-VPN systems.
Yes, FG-IR-23-097 can potentially lead to data breaches if exploited by an attacker.
As of now, a specific patch has not been released for FG-IR-23-097, so disabling SSL-VPN is the recommended workaround.