First published: Tue Oct 10 2023(Updated: )
A use after free vulnerability [CWE-416] in FortiOS & FortiProxy may allow an unauthenticated remote attacker to crash the Web Proxy process via multiple crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-23-184 vulnerability is classified as a critical issue that can lead to the crashing of the Web Proxy process.
To mitigate FG-IR-23-184, upgrade to the latest version of FortiOS or FortiProxy provided by Fortinet.
Yes, FG-IR-23-184 can be exploited by unauthenticated remote attackers through crafted packets.
FG-IR-23-184 affects Fortinet FortiOS and FortiProxy that utilize proxy mode with SSL deep packet inspection.
FG-IR-23-184 can lead to service disruption by crashing the Web Proxy process on affected systems.