First published: Tue Jul 11 2023(Updated: )
A stack-based overflow vulnerability [CWE-124] in FortiOS & FortiProxy may allow a remote attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.## Workaround:Disable HTTP/2 support on SSL inspection profiles used by proxy policies or firewall policies with proxy mode.Example with custom-deep-inspection profile:<br/>config firewall ssl-ssh-profile<br/>edit "custom-deep-inspection"<br/>set supported-alpn http1-1<br/>next<br/>end<br/>https://docs.fortinet.com/document/fortigate/7.0.0/new-features/710924/http-2-support-in-proxy-mode-ssl-inspection
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-183 is critical due to its potential to allow remote code execution.
To fix FG-IR-23-183, it is recommended to disable HTTP/2 support in FortiOS and FortiProxy configurations.
FG-IR-23-183 affects Fortinet FortiOS and FortiProxy without specifying version numbers.
FG-IR-23-183 can allow attackers to execute arbitrary code or commands via crafted packets.
FG-IR-23-183 is a stack-based overflow vulnerability that compromises system integrity.