First published: Tue Nov 14 2023(Updated: )
A null pointer dereference [CWE-476] in FortiOS and FortiProxy SSL VPN may allow an authenticated attacker to perform a DoS attack on the device via specifically crafted HTTP requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.5 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiOS IPS Engine | >=6.0 | |
Fortinet FortiProxy | >=7.2.0<=7.2.4 | |
Fortinet FortiProxy | >=7.0.0<=7.0.10 | |
Fortinet FortiProxy | >=2.0 | |
Fortinet FortiProxy | >=1.2 | |
Fortinet FortiProxy | >=1.1 | |
Fortinet FortiProxy | >=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-151 is critical as it allows for a denial of service attack on FortiOS and FortiProxy SSL VPN.
To fix FG-IR-23-151, upgrade to the recommended FortiOS or FortiProxy versions which mitigate the vulnerability.
FG-IR-23-151 affects FortiOS versions prior to 7.4.1 and FortiProxy versions prior to 7.2.5.
Yes, FG-IR-23-151 can be exploited remotely by an authenticated attacker through crafted HTTP requests.
A null pointer dereference in FG-IR-23-151 refers to an error that can crash the application, leading to a denial of service condition.