First published: Tue May 14 2024(Updated: )
An insufficient verification of data authenticity vulnerability [CWE-345] in FortiOS & FortiProxy SSL-VPN tunnel mode may allow an authenticated VPN user to send (but not receive) packets spoofing the IP of another user via crafted network packets.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.1 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.12 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiOS IPS Engine | >=6.2 | |
Fortinet FortiProxy | >=7.4.0<=7.4.1 | |
Fortinet FortiProxy | >=7.2.0<=7.2.7 | |
Fortinet FortiProxy | >=7.0.0<=7.0.13 | |
Fortinet FortiProxy | >=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-225 is categorized as a high risk due to its potential to allow IP spoofing by authenticated VPN users.
To fix FG-IR-23-225, update FortiOS and FortiProxy to the recommended versions: FortiOS to 7.4.2, 7.2.8, or 7.0.13, depending on your current version.
FG-IR-23-225 affects users of FortiOS and FortiProxy versions that are older than the specified remedial updates.
FG-IR-23-225 impacts FortiOS and FortiProxy products that fall within specific version ranges susceptible to the vulnerability.
No, FG-IR-23-225 requires an authenticated VPN user to exploit the vulnerability.